Q: 1
Which layer of the TCP/IP stack promotes the reliable transmission of data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
SIMULATION
For this question you must log into Greenbone Vulnerability Manager using Firefox. The URL is:
https://10.10.55.4:9392 and credentials are:
Username: admin
Password: Secure-gvm!
A colleague performed a vulnerability scan but did not review prior to leaving for a family
emergency. It has been determined that a threat actor is using CVE-2021-22145 in the wild. What is
the host IP of the machine that is vulnerable to this CVE?
Your Answer
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following is a PRIMARY risk that can be introduced through the use of a site-to-site
virtual private network (VPN) with a service provider?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
An organization was breached via a web application attack to a database in which user inputs were
not validated. This can BEST be described as which type of attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following is the MOST effective approach for tracking vulnerabilities in an organization's
systems and applications?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A small organization has identified a potential risk associated with its outdated backup system and
has decided to implement a new cloud-based real-time backup system to reduce the likelihood of
data loss. Which of the following risk responses has the organization chosen?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which of the following BEST enables an organization to identify potential security threats by
monitoring and analyzing network traffic for unusual activity?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A penetration tester has been hired and given access to all code, diagrams, and documentation.
Which type of testing is being conducted?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which type of access control can be modified by a user or data owner?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2