New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What can be configured on the router so that it can most effectively implement and enforce zones for the shown subnets?

A.

MAC-based port security

B.

Access control lists

C.

Secure Shell

D.

802. 1x protocol

What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?

A.

Attack surface analysis

B.

Application allow lists

C.

Sand boxing

D.

Centralized logging

What is a benefit of log aggregation?

A.

Simplifies initial setup of logging in the environment

B.

Reduces system load on logging devices

C.

Eliminates the need for baselining normal log activity

D.

Assists in analysis of log data from multiple sources

An administrator wants to script the deployment of a security policy, over the network, to a group of workstations not managed by Active Directory. What tool could be used to accomplish this task?

A.

secedit.exe

B.

secpol.msc

C.

gpedit.msc

Which of the following is a containment task within the six step incident handling process?

A.

Checking to ensure that the most recent patches were deployed to a web application server

B.

Creating a forensic image of a compromised workstation

C.

Re-imaging a workstation that was exhibiting worm-like behaviour

D.

Validate fix using a vulnerability scan of the hosts within the DMZ

Which of the following is a facilitated tabletop exercise that is run in odd years and provides an overall public Lessons Learned report each year it is run?

A.

CRPA

B.

E-ISAC

C.

GridEx

D.

CTEP

Which resource includes a standardized categorization of common software vulnerabilities?

A.

CWE

B.

CVSS

C.

CSC

D.

CIP

What is the purpose of the traffic shown in the screenshot?

A.

Modbus write coil

B.

Modbus query

C.

Modbus read coils

D.

Modbus database response

E.

Modbus read registers

For a SQL injection login authentication bypass to work on a website, it will contain a username comparison that the database finds to be true. What else is required for the bypass to work?

A.

An unencrypted login page

B.

The database's comment characters

C.

Two pipe characters (||)

D.

The correct password

An administrator relaxes the password policy during disaster recovery operations. What is the result of this action?

A.

Negative effect on recovery point objective (RPO)

B.

Positive effect on recovery time objective (RTO)

C.

Increased risk

D.

Reduced insurance needs