Q: 1
A security operations center (SOC) analyst observed an unusually high number of login failures on a
particular database server. The analyst wants to gather supporting evidence before escalating the
observation to management. Which of the following expressions will provide login failure data for
11/24/2015?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
An administrator investigating intermittent network communication problems has identified an
excessive amount of traffic from an external-facing host to an unknown location on the Internet.
Which of the following
BEST describes what is occurring?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
While performing routing maintenance on a Windows Server, a technician notices several
unapproved Windows Updates and that remote access software has been installed. The technician
suspects that a malicious actor has gained access to the system. Which of the following steps in the
attack process does this activity indicate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
What are three examples of incident response? (Choose three.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following types of attackers would be MOST likely to use multiple zero-day exploits
executed against high-value, well-defended targets for the purposes of espionage and sabotage?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
When attempting to determine which system or user is generating excessive web traffic, analysis of
which of
the following would provide the BEST results?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
A system administrator has been tasked with developing highly detailed instructions for patching
managed assets using the corporate patch management solution. These instructions are an example
of which of the following?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A suspicious script was found on a sensitive research system. Subsequent analysis determined that
proprietary data would have been deleted from both the local server and backup media immediately
following a specific administrator’s removal from an employee list that is refreshed each evening.
Which of the following BEST describes this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which common source of vulnerability should be addressed to BEST mitigate against URL redirection
attacks?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2