Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is an outcome of the initial triage during incident response?

A.

Removal of unnecessary accounts from compromised systems

B.

Segmentation of the network to protect critical assets

C.

Resetting registry keys that vary from the baseline configuration

D.

Determining whether encryption is in use on in scope systems

The matrix in the screen shot below would be created during which process?

A.

Risk Assessment

B.

System Hardening

C.

Data Classification

D.

Vulnerability Scanning

Which of the following is an SNMPv3 security feature that was not provided by earlier versions of the protocol?

A.

Authentication based on RSA key pairs

B.

The ability to change default community strings

C.

AES encryption for SNMP network traffic

D.

The ability to send SNMP traffic over TCP ports

An incident response team is handling a worm infection among their user workstations. They created an IPS signature to detect and block worm activity on the border IPS, then removed the worm’s artifacts or workstations triggering the rule. Despite this action, worm activity continued for days after. Where did the incident response team fail?

A.

The team did not adequately apply lessons learned from the incident

B.

The custom rule did not detect all infected workstations

C.

They did not receive timely notification of the security event

D.

The team did not understand the worm’s propagation method

Although the packet listed below contained malware, it freely passed through a layer 3 switch. Why didn’t the switch detect the malware in this packet?

A.

The packet was part of a fragmentation attack

B.

The data portion of the packet was encrypted

C.

The entire packet was corrupted by the malware

D.

It didn’t look deeply enough into the packet

Why would the pass action be used in a Snort configuration file?

A.

The pass action simplifies some filtering by specifying what to ignore.

B.

The pass action passes the packet onto further rules for immediate analysis.

C.

The pass action serves as a placeholder in the snort configuration file for future rule updates.

D.

Using the pass action allows a packet to be passed to an external process.

E.

The pass action increases the number of false positives, better testing the rules.

Why would a Cisco network device with the latest updates and patches have the service config setting enabled, making the device vulnerable to the TFTP Server Attack?

A.

Disabling telnet enables the setting on the network device.

B.

This setting is enabled by default in the current Cisco IOS.

C.

Allowing remote administration using SSH under the Cisco IOS also enables the setting.

D.

An attack by Cisco Global Exploiter will automatically enable the setting.

E.

This older default IOS setting was inherited from an older configuration despite the upgrade.

The security team wants to detect connections that can compromise credentials by sending them in plaintext across the wire. Which of the following rules should they enable on their IDS sensor?

A.

alert tcp any 22 < > any 22 (msg:SSH connection; class type:misc-attack;sid: 122:rev:1;)

B.

alert tcp any any < > any 6000: (msg:X-Windows session; flow:from_server,established;nocase;classtype:misc-attack;sid:101;rev:1;)

C.

alert tcp any 23 < > any 23 (msg:Telnet shell; class type:misc-attack;sid:100; rev:1;)

D.

alert udp any any < > any 5060 (msg:VOIP message; classtype:misc-attack;sid:113; rev:2;)

Analyze the screenshot below. Which of the following attacks can be mitigated by these configuration settings?

A.

A Denial-of-Service attack using network broadcasts

B.

A Replay attack

C.

An IP masquerading attack

D.

A MAC Flood attack

A company estimates a loss of $2,374 per hour in sales if their website goes down. Their webserver hosting site’s documented downtime was 7 hours each quarter over the last two years. Using the information, what can the analyst determine?

A.

Annualized loss expectancy

B.

CVSS risk score

C.

Total cost of ownership

D.

Qualitative risk posture