Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?

A.

VM escape

B.

Side loading

C.

Remote code execution

D.

Resource exhaustion

After a series of account compromises and credential misuse, a company hires a security manager to develop a security program. Which of the following steps should the security manager take first to increase security awareness?

A.

Evaluate tools that identify risky behavior and distribute reports on the findings.

B.

Send quarterly newsletters that explain the importance of password management.

C.

Develop phishing campaigns and notify the management team of any successes.

D.

Update policies and handbooks to ensure all employees are informed of the new procedures.

Which of the following is the best reason to perform a tabletop exercise?

A.

To address audit findings

B.

To collect remediation response times

C.

To update the IRP

D.

To calculate the ROI

A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?

A.

Input sanitization

B.

Secure cookies

C.

Static code analysis

D.

Sandboxing

An organization's web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization's web servers? (Select two).

A.

Regularly updating server software and patches

B.

Implementing strong password policies

C.

Encrypting sensitive data at rest and in transit

D.

Utilizing a web-application firewall

E.

Performing regular vulnerability scans

F.

Removing payment information from the servers

Which of the following hardening techniques must be applied on a container image before deploying it to a production environment? (Select two).

A.

Remove default applications.

B.

Install a NIPS.

C.

Disable Telnet.

D.

Reconfigure the DNS

E.

Add an SFTP server.

F.

Delete the public certificate.

Which of the following is the best way to prevent data from being leaked from a secure network that does not need to communicate externally?

A.

Air gap

B.

Containerization

C.

Virtualization

D.

Decentralization

Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?

A.

E-discovery

B.

User provisioning

C.

Firewall log export

D.

Root cause analysis

Which of the following activities would involve members of the incident response team and other stakeholders simulating an event?

A.

Lessons learned

B.

Digital forensics

C.

Tabletop exercise

D.

Root cause analysis

A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?

A.

Permission restrictions

B.

Hashing

C.

Input validation

D.

Access control list

Which of the following would best prepare a security team for a specific incident response scenario?

A.

Situational awareness

B.

Risk assessment

C.

Root cause analysis

D.

Tabletop exercise

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

A.

Audit each domain administrator account weekly for password compliance.

B.

Implement a privileged access management solution.

C.

Create IDS policies to monitor domain controller access.

D.

Use Group Policy to enforce password expiration.

Which of the following involves an attempt to take advantage of database misconfigurations?

A.

Buffer overflow

B.

SQL injection

C.

VM escape

D.

Memory injection

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

A.

Hot site

B.

Cold site

C.

Failover site

D.

Warm site

Which of the following is an example of a false negative vulnerability detection in a scan report?

A.

A vulnerability that does not actually exist

B.

A vulnerability that has already been remediated

C.

A result that shows no known vulnerability

D.

A zero-day vulnerability with a known remediation