A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the files creator. Which of the following actions would most likely give the security analyst the information required?
D
A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
A
Which of the following most impacts an administrators ability to address CVEs discovered on a server?
B
Which of the following is the best way to secure an on-site data center against intrusion from an insider?
B
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
B
Which of the following is used to validate a certificate when it is presented to a user?
A
A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?
D
Which of the following methods would most likely be used to identify legacy systems?
B
HOTSPOT -
You are a security administrator investigating a potential infection on a network.
INSTRUCTIONS -
Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Which of the following describes an executive team that is meeting in a board room and testing the companys incident response plan?
C