Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?
After a series of account compromises and credential misuse, a company hires a security manager to develop a security program. Which of the following steps should the security manager take first to increase security awareness?
Which of the following is the best reason to perform a tabletop exercise?
A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?
An organization's web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization's web servers? (Select two).
Which of the following hardening techniques must be applied on a container image before deploying it to a production environment? (Select two).
Which of the following is the best way to prevent data from being leaked from a secure network that does not need to communicate externally?
Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?
Which of the following activities would involve members of the incident response team and other stakeholders simulating an event?
A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?
Which of the following would best prepare a security team for a specific incident response scenario?
A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?
Which of the following involves an attempt to take advantage of database misconfigurations?
The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?
Which of the following is an example of a false negative vulnerability detection in a scan report?