All questions Flashcards
246. An email recipient is unable to open a message encrypted through PKI that was sent from another organization. Which of the following does the recipient need to decrypt the message? • A. The sender's private key • B. The recipient's private key • C. The recipient's public key • D. The CA's root certificate • E. The sender's public key • F. An updated CRL
Correct Answer: E
245. A security administrator found the following piece of code referenced on a domain controller's task scheduler: $var = GetDomainAdmins If $var != "˜fabio' SetDomainAdmins = NULL With which of the following types of malware is the code associated? • A. RAT • B. Backdoor • C. Logic bomb • D. Crypto-malware
Correct Answer: C
- Which of the following is the proper use of a Faraday cage?
• A. To block electronic signals sent to erase a cell phone
• B. To capture packets sent to a honeypot during an attack
• C. To protect hard disks from access during a forensics investigation
• D. To restrict access to a building allowing only one person to enter at a time
Correct Answer: A
- In highly secure environments where the risk of malicious actors attempting
to steal data is high, which of the following is the BEST reason to deploy Faraday
cages?
• A. To provide emanation control to prevent credential harvesting
• B. To minimize signal attenuation over distances to maximize signal strength
• C. To minimize external RF interference with embedded processors
• D. To protect the integrity of audit logs from malicious alteration
Correct Answer: C
- A security professional wants to test a piece of malware that was isolated on
a user’s computer to document its effect on a system.
Which of the following is the FIRST step the security professional should take?
• A. Create a sandbox on the machine.
• B. Open the file and run it.
• C. Create a secure baseline of the system state.
• D. Harden the machine.
Correct Answer: C
- The exploitation of a buffer-overrun vulnerability in an application will MOST
likely lead to:
• A. arbitrary code execution.
• B. resource exhaustion.
• C. exposure of authentication credentials.
• D. dereferencing of memory pointers.
Correct Answer: A
240. Using a one-time code that has been texted to a smartphone is an example of: • A. something you have. • B. something you know. • C. something you do. • D. something you are.
Correct Answer: A
- Which of the following BEST explains the difference between a credentialed
scan and a non-credentialed scan?
• A. A credentialed scan sees devices in the network, including those behind NAT, while
a non-credentialed scan sees outward-facing applications.
• B. A credentialed scan will not show up in system logs because the scan is running with
the necessary authorization, while non-credentialed scan activity will appear in the logs.
• C. A credentialed scan generates significantly more false positives, while a noncredentialed scan generates fewer false positives.
• D. A credentialed scan sees the system the way an authorized user sees the system,
while a non-credentialed scan sees the system as a guest.
Correct Answer: D
- A first responder needs to collect digital evidence from a compromised
headless virtual host.
Which of the following should the first responder collect FIRST?
- A. Virtual memory
- B. BIOS configuration
- C. Snapshot
- D. RAM
Correct Answer: C
- An organization wants to set up a wireless network in the most secure way.
Budget is not a major consideration, and the organization is willing to accept
some complexity when clients are connecting. It is also willing to deny wireless
connectivity for clients who cannot be connected in the most secure manner.
Which of the following would be the MOST secure setup that conforms to the
organization’s requirements?
• A. Enable WPA2-PSK for older clients and WPA2-Enterprise for all other clients.
• B. Enable WPA2-PSK, disable all other modes, and implement MAC filtering along with
port security.
• C. Use WPA2-Enterprise with RADIUS and disable pre-shared keys.
• D. Use WPA2-PSK with a 24-character complex password and change the password
monthly.
Correct Answer: C
- Which of the following serves to warn users against downloading and
installing pirated software on company devices?
- A. AUP
- B. NDA
- C. ISA
- D. BPA
Correct Answer: A
- A security analyst is investigating a call from a user regarding one of the
websites receiving a 503: Service Unavailable error. The analyst runs a netstat-an
command to discover if the web server is up and listening. The analyst receives
the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
- A. Buffer overflow
- B. Domain hijacking
- C. Denial of service
- D. ARP poisoning
Correct Answer: C
- Which of the following documents would provide specific guidance
regarding ports and protocols that should be disabled on an operating system?
• A. Regulatory requirements
• B. Secure configuration guide
• C. Application installation guides
• D. User manuals
Correct Answer: B
- A security engineer is analyzing the following line of JavaScript code that
was found in a comment field on a web forum, which was recently involved in a
security breach:
Given the line of code above, which of the following BEST represents the attack performed during the breach? • A. CSRF • B. DDoS • C. DoS • D. XSS
Correct Answer: D
- An organization is concerned about video emissions from users’ desktops.
Which of the following is the BEST solution to implement?
• A. Screen filters
• B. Shielded cables
• C. Spectrum analyzers
• D. Infrared detection
Correct Answer: A
- Which of the following BEST distinguishes Agile development from other
methodologies in terms of vulnerability management?
• A. Cross-functional teams
• B. Rapid deployments
• C. Daily standups
• D. Peer review
• E. Creating user stories
Correct Answer: C
- A systems administrator is receiving multiple alerts from the company NIPS.
A review of the NIPS logs shows the following: reset both: 70.32.200.2:3194 “”>
10.4.100.4:80 buffer overflow attempt reset both: 70.32.200.2:3230 “”>
10.4.100.4:80 directory traversal attack reset client: 70.32.200.2:4019 “”>
10.4.100.4:80 Blind SQL injection attack
Which of the following should the systems administrator report back to
management?
• A. The company web server was attacked by an external source, and the NIPS blocked
the attack.
• B. The company web and SQL servers suffered a DoS caused by a misconfiguration of
the NIPS.
• C. An external attacker was able to compromise the SQL server using a vulnerable web
application.
• D. The NIPS should move from an inline mode to an out-of-band mode to reduce
network latency.
Correct Answer: A
- A contracting company recently completed its period of performance on a
government contract and would like to destroy all information associated with
contract performance.
Which of the following is the best NEXT step for the company to take?
• A. Consult data disposition policies in the contract.
• B. Use a pulper or pulverizer for data destruction.
• C. Retain the data for a period no more than one year.
• D. Burn hard copies containing PII or PHI
Correct Answer: A
- A security analyst is interested in setting up an IDS to monitor the company
network. The analyst has been told there can be no network downtime to
implement the solution, but the IDS must capture all of the network traffic.
Which of the following should be used for the IDS implementation?
• A. Network tap
• B. Honeypot
• C. Aggregation
• D. Port mirror
Correct Answer: A
- A company employee recently retired, and there was a schedule delay
because no one was capable of filling the employee’s position.
Which of the following practices would BEST help to prevent this situation in the
future?
• A. Mandatory vacation
• B. Separation of duties
• C. Job rotation
• D. Exit interviews
Correct Answer: C
- After discovering a security incident and removing the affected files, an
administrator disabled an unneeded service that led to the breach.
Which of the following steps in the incident response process has the
administrator just completed?
• A. Containment
• B. Eradication
• C. Recovery
• D. Identification
Correct Answer: B
225. Which of the following is the MOST likely motivation for a script kiddie threat actor? • A. Financial gain • B. Notoriety • C. Political expression • D. Corporate espionage
Correct Answer: B
- An administrator is disposing of media that contains sensitive information.
Which of the following will provide the MOST effective method to dispose of the
media while ensuring the data will be unrecoverable?
• A. Wipe the hard drive.
• B. Shred the hard drive.
• C. Sanitize all of the data.
• D. Degauss the hard drive
Correct Answer: B
- An organization is building a new customer services team, and the manager
needs to keep the team focused on customer issues and minimize distractions.
The users have a specific set of tools installed, which they must use to perform
their duties. Other tools are not permitted for compliance and tracking purposes.
Team members have access to the Internet for product lookups and to research
customer issues.
Which of the following should a security engineer employ to fulfill the
requirements for the manager?
- A. Install a web application firewall.
- B. Install HIPS on the team’s workstations.
- C. Implement containerization on the workstations.
- D. Configure whitelisting for the team.
Correct Answer: C
- A technician is required to configure updates on a guest operating system
while maintaining the ability to quickly revert the changes that were made while
testing the updates.
Which of the following should the technician implement?
• A. Snapshots
• B. Revert to known state
• C. Rollback to known configuration
• D. Shadow copy
Correct Answer: A
- While monitoring the SIEM, a security analyst observes traffic from an
external IP to an IP address of the business network on port 443.
Which of the following protocols would MOST likely cause this traffic?
- A. HTTP
- B. SSH
- C. SSL
- D. DNS
Correct Answer: C
- During a security audit of a company’s network, unsecure protocols were
found to be in use. A network administrator wants to ensure browser-based
access to company switches is using the most secure protocol.
Which of the following protocols should be implemented?
• A. SSH2
• B. TLS1.2
• C. SSL1.3
• D. SNMPv3
Correct Answer: B
- An organization’s IRP prioritizes containment over eradication. An incident
has been discovered where an attacker outside of the organization has installed
cryptocurrency mining software on the organization’s web servers.
Given the organization’s stated priorities, which of the following would be the
NEXT step?
• A. Remove the affected servers from the network.
• B. Review firewall and IDS logs to identify possible source IPs.
• C. Identify and apply any missing operating system and software patches.
• D. Delete the malicious software and determine if the servers must be reimaged.
Correct Answer: B
- An attacker has obtained the user ID and password of a datacenter’s backup
operator and has gained access to a production system.
Which of the following would be the attacker’s NEXT action?
• A. Perform a passive reconnaissance of the network.
• B. Initiate a confidential data exfiltration process.
• C. Look for known vulnerabilities to escalate privileges.
• D. Create an alternate user ID to maintain persistent access.
Correct Answer: B
- A company recently installed fingerprint scanners at all entrances to
increase the facility’s security. The scanners were installed on Monday morning,
and by the end of the week it was determined that 1.5% of valid users were denied
entry.
Which of the following measurements do these users fall under?
• A. FRR
• B. FAR
• C. CER
• D. SLA
Correct Answer: A
- Which of the following represents a multifactor authentication system?
• A. An iris scanner coupled with a palm print reader and fingerprint scanner with liveness
detection.
• B. A secret passcode that prompts the user to enter a secret key if entered correctly.
• C. A digital certificate on a physical token that is unlocked with a secret passcode.
• D. A one-time password token combined with a proximity badge.
Correct Answer: C
- An organization’s policy requires users to create passwords with an
uppercase letter, lowercase letter, number, and symbol. This policy is enforced
with technical controls, which also prevents users from using any of their
previous 12 passwords. The quantization does not use single sign-on, nor does it
centralize storage of passwords.
The incident response team recently discovered that passwords for one system
were compromised. Passwords for a completely separate system have NOT been
compromised, but unusual login activity has been detected for that separate
system. Account login has been detected for users who are on vacation.
Which of the following BEST describes what is happening?
• A. Some users are meeting password complexity requirements but not password length
requirements.
• B. The password history enforcement is insufficient, and old passwords are still valid
across many different systems.
• C. Some users are reusing passwords, and some of the compromised passwords are
valid on multiple systems.
• D. The compromised password file has been brute-force hacked, and the complexity
requirements are not adequate to mitigate this risk.
Correct Answer: D
- A healthcare company is revamping its IT strategy in light of recent
regulations. The company is concerned about compliance and wants to use a
pay-per-use model.
Which of the following is the BEST solution?
- A. On-premises hosting
- B. Community cloud
- C. Hosted infrastructure
- D. Public SaaS
Correct Answer: D
- The Chief Information Officer (CIO) has determined the company’s new PKI
will not use OCSP. The purpose of OCSP still needs to be addressed.
Which of the following should be implemented?
• A. Build an online intermediate CA.
• B. Implement a key escrow.
• C. Implement stapling.
• D. Install a CRL.
Correct Answer: D
- Which of the following is a security consideration for IoT devices?
• A. IoT devices have built-in accounts that users rarely access.
• B. IoT devices have less processing capabilities.
• C. IoT devices are physically segmented from each other.
• D. IoT devices have purpose-built applications.
Correct Answer: A
- An organization needs to integrate with a third-party cloud application. The
organization has 15000 users and does not want to allow the cloud provider to
query its LDAP authentication server directly.
Which of the following is the BEST way for the organization to integrate with the
cloud application?
• A. Upload a separate list of users and passwords with a batch import.
• B. Distribute hardware tokens to the users for authentication to the cloud.
• C. Implement SAML with the organization’s server acting as the identity provider.
• D. Configure a RADIUS federation between the organization and the cloud provider.
D. Configure a RADIUS federation between the organization and the cloud provider
- An attacker has gathered information about a company employee by
obtaining publicly available information from the Internet and social networks.
Which of the following types of activity is the attacker performing?
• A. Pivoting
• B. Exfiltration of data
• C. Social engineering
• D. Passive reconnaissance
D. Passive reconnaissance
- A company is examining possible locations for a hot site.
Which of the following considerations is of MOST concern if the replication
technology being used is highly sensitive to network latency?
- A. Connection to multiple power substations
- B. Location proximity to the production site
- C. Ability to create separate caged space
- D. Positioning of the site across international borders
Correct Answer: B
- A government organization recently contacted three different vendors to
obtain cost quotes for a desktop PC refresh. The quote from one of the vendors
was significantly lower than the other two and was selected for the purchase.
When the PCs arrived, a technician determined some NICs had been tampered
with.
Which of the following MOST accurately describes the security risk presented in
this situation?
• A. Hardware root of trust
• B. UEFI
• C. Supply chain
• D. TPM
• E. Crypto-malware
• F. ARP poisoning
Correct Answer: C
- A company is experiencing an increasing number of systems that are
locking up on Windows startup. The security analyst clones a machine, enters
into safe mode, and discovers a file in the startup process that runs Wstart.bat.
@echo off
:asdhbawdhbasdhbawdhb
start notepad.exe
start notepad.exe
start calculator.exe
start calculator.exe
goto asdhbawdhbasdhbawdhb
Given the file contents and the system’s issues, which of the following types of
malware is present?
- A. Rootkit
- B. Logic bomb
- C. Worm
- D. Virus
Correct Answer: B
- A Chief Information Security Officer (CISO) for a school district wants to
enable SSL to protect all of the public-facing servers in the domain.
Which of the following is a secure solution that is the MOST cost effective?
• A. Create and install a self-signed certificate on each of the servers in the domain.
• B. Purchase a load balancer and install a single certificate on the load balancer.
• C. Purchase a wildcard certificate and implement it on every server.
• D. Purchase individual certificates and apply them to the individual servers.
A. Create and install a self-signed certificate on each of the servers in the domain.
- The president of a company that specializes in military contracts receives a
request for an interview. During the interview, the reporter seems more interested
in discussing the president’s family life and personal history than the details of a
recent company success.
Which of the following security concerns is this MOST likely an example of?
• A. Insider threat
• B. Social engineering
• C. Passive reconnaissance
• D. Phishing
Correct Answer: B
- A company moved into a new building next to a sugar mil. Cracks have been
discovered in the walls of the server room, which is located on the same side as
the sugar mill loading docks. The cracks are believed to have been caused by
heavy trucks. Moisture has begun to seep into the server room, causing extreme
humidification problems and equipment failure.
Which of the following BEST describes the type of threat the organization faces?
• A. Foundational
• B. Man-made
• C. Environmental
• D. Natural
Correct Answer: A
- A security analyst wishes to scan the network to view potentially vulnerable
systems the way an attacker would.
Which of the following would BEST enable the analyst to complete the objective?
• A. Perform a non-credentialed scan.
• B. Conduct an intrusive scan.
• C. Attempt escalation of privilege.
• D. Execute a credentialed scan.
Correct Answer: A
- Which of the following is an example of federated access management?
• A. Windows passing user credentials on a peer-to-peer network
• B. Applying a new user account with a complex password
• C. Implementing a AAA framework for network access
• D. Using a popular website login to provide access to another website
Correct Answer: D
201. Which of the following is unique to a stream cipher? • A. It encrypt 128 bytes at a time. • B. It uses AES encryption. • C. It performs bit-level encryption. • D. It is used in HTTPS.
Correct Answer: C
- A systems developer needs to provide machine-to-machine interface
between an application and a database server in the production environment.
This interface will exchange data once per day.
Which of the following access control account practices would BEST be used in
this situation?
• A. Establish a privileged interface group and apply read-write permission to the
members of that group.
• B. Submit a request for account privilege escalation when the data needs to be
transferred.
• C. Install the application and database on the same server and add the interface to the
local administrator group.
• D. Use a service account and prohibit users from accessing this account for
development work.
D. Use a service account and prohibit users from accessing this account for
development work
199. A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites. Which of the following tools will the security administrator use to conduct this inventory MOST efficiently? • A. tcpdump • B. Protocol analyzer • C. Netstat • D. Nmap
D. Nmap
198. Which of the following command line tools would be BEST to identify the services running in a server? • A. traceroute • B. nslookup • C. ipconfig • D. netstat
D. netstat
- A security administrator is investigating a possible account compromise.
The administrator logs onto a desktop computer, executes the command
notepad.exe c:\Temp\qkakforlkgfkja.log, and reviews the following:
Lee,\rI have completed the task that was assigned to me\rrespectfully\rJohn\r
https://www.portal.com\rjohnuser\rilovemycat2
Given the above output, which of the following is the MOST likely cause of this
compromise?
• A. Virus
• B. Worm
• C. Rootkit
• D. Keylogger
D. Keylogger
196. Which of the following is MOST likely caused by improper input handling? • A. Loss of database tables • B. Untrusted certificate warning • C. Power off reboot loop • D. Breach of firewall ACLs
A. Loss of database tables
195. A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.) • A. tcpdump • B. nc • C. nmap • D. nslookup • E. tail • F. tracert
Correct Answer: BC
- A company recently implemented a new security system. In the course of
configuration, the security administrator adds the following entry:
#Whitelist
USB\VID_13FE&PID_4127&REV_0100
Which of the following security technologies is MOST likely being configured?
• A. Application whitelisting
• B. HIDS
• C. Data execution prevention
• D. Removable media control
D. Removable media control
- A Chief Information Officer (CIO) is concerned that encryption keys might be
exfiltrated by a contractor. The CIO wants to keep control over key visibility and
management.
Which of the following would be the BEST solution for the CIO to implement?”
• A. HSM
• B. CA
• C. SSH
• D. SSL
A. HSM
192. Which of the following provides PFS? • A. AES • B. RC4 • C. DHE • D. HMAC
C. DHE
- A security administrator is investigating a report that a user is receiving
suspicious emails. The user’s machine has an old functioning modem installed.
Which of the following security concerns need to be identified and mitigated?
(Choose two.)
• A. Vishing
• B. Whaling
• C. Spear phishing
• D. Pharming
• E. War dialing
• F. Hoaxing
Correct Answer: EF
- A technician, who is managing a secure B2B connection, noticed the
connection broke last night. All networking equipment and media are functioning
as expected, which leads the technician to question certain PKI components.
Which of the following should the technician use to validate this assumption?
(Choose two.)
• A. PEM
• B. CER
• C. SCEP
• D. CRL
• E. OCSP
• F. PFX
Correct Answer: DE
CRL and OCSP
- A state-sponsored threat actor has launched several successful attacks
against a corporate network. Although the target has a robust patch management
program in place, the attacks continue in depth and scope, and the security
department has no idea how the attacks are able to gain access. Given that patch
management and vulnerability scanners are being used, which of the following
would be used to analyze the attack methodology?
• A. Rogue system detection
• B. Honeypots
• C. Next-generation firewall
• D. Penetration test
B. Honeypots
- An organization wishes to allow its users to select devices for business use
but does not want to overwhelm the service desk with requests for too many
different device types and models.
Which of the following deployment models should the organization use to BEST
meet these requirements?
• A. VDI environment
• B. CYOD model
• C. DAC mode
• D. BYOD model
B. CYOD model
choose your own device
187. Given the information below: MD5HASH document.doc 049eab40fd36caadlfab10b3cdf4a883 [1] Which of the following concepts are described above? (Choose two.) • A. Salting • B. Collision • C. Steganography • D. Hashing • E. Key stretching
B. Collision
D. Hashing
- A security administrator receives alerts from the perimeter UTM. Upon
checking the logs, the administrator finds the following output:
Time: 12/25 0300
From Zone: Untrust
To Zone: DMZ
Attacker: externalip.com
Victim: 172.16.0.20
To Port: 80
Action: Alert
Severity: Critical
When examining the PCAP associated with the event, the security administrator
finds the following information:
alert (“Click here for important information regarding your account!
http://externalip.com/account.php”); script>
Which of the following actions should the security administrator take?
• A. Upload the PCAP to the IDS in order to generate a blocking signature to block the
traffic.
• B. Manually copy the data from the PCAP file and generate a blocking
signature in the HIDS to block the traffic for future events.
• C. Implement a host-based firewall rule to block future events of this type from
occurring.
• D. Submit a change request to modify the XSS vulnerability signature to TCP reset on
future attempts.
B. Manually copy the data from the PCAP file and generate a blocking
signature in the HIDS to block the traffic for future events.
- A systems administrator has installed a new UTM that is capable of
inspecting SSL/TLS traffic for malicious payloads. All inbound network traffic
coming from the Internet and terminating on the company’s secure web servers
must be inspected.
Which of the following configurations would BEST support this requirement?
• A. The web servers’ CA full certificate chain must be installed on the UTM.
• B. The UTM certificate pair must be installed on the web servers.
• C. The web servers’ private certificate must be installed on the UTM.
• D. The UTM and web servers must use the same certificate authority.
A. The web servers’ CA full certificate chain must be installed on the UTM.
- A preventive control differs from a compensating control in that a preventive
control is:
• A. put in place to mitigate a weakness in a user control.
• B. deployed to supplement an existing control that is EOL.
• C. relied on to address gaps in the existing control structure.
• D. designed to specifically mitigate a risk.
C. relied on to address gaps in the existing control structure.
183. Which of the following encryption algorithms require one encryption key? (Choose two.) • A. MD5 • B. 3DES • C. BCRYPT • D. RC4 • E. DSA
B. 3DES
D. RC4
- A network administrator is implementing multifactor authentication for
employees who travel and use company devices remotely by using the company
VPN.
Which of the following would provide the required level of authentication?
• A. 802.1X and OTP
• B. Fingerprint scanner and voice recognition
• C. RBAC and PIN
• D. Username/Password and TOTP
A. 802.1X and OTP
- A systems administrator is increasing the security settings on a virtual host
to ensure users on one VM cannot access information from another VM.
Which of the following is the administrator protecting against?
• A. VM sprawl - Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where administrators can no longer manage them effectively. Virtualization sprawl is also referred to as virtual machine sprawl, VM sprawl or virtual server sprawl.
• B. VM escape - Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor. Such an exploit could give the attacker access to the host operating system and all other virtual machines (VMs) running on that host.
- C. VM migration - Virtual machine migration is the task of moving a virtual machine from one physical hardware environment to another. It is part of managing hardware virtualization systems and is something that providers look at as they offer virtualization services. Virtual machine migration is also known as teleportation.
- D. VM sandboxing - When something is put in a sandbox environment, it’s essentially in a virtual machine that’s isolated from the rest of the endpoint
B. VM escape
- Moving laterally within a network once an initial exploit is used to gain
persistent access for the purpose of establishing further control of a system is
known as:
• A. pivoting.
• B. persistence.
• C. active reconnaissance.
• D. a backdoor.
B. persistence.
- A company network is currently under attack. Although security controls are
in place to stop the attack, the security administrator needs more information
about the types of attacks being used.
Which of the following network types would BEST help the administrator gather
this information?
• A. DMZ
• B. Guest network
• C. Ad hoc
• D. Honeynet
D. Honeynet
- An organization’s research department uses workstations in an air-gapped
network. A competitor released products based on files that originated in the
research department.
Which of the following should management do to improve the security and
confidentiality of the research files?
• A. Implement multifactor authentication on the workstations.
• B. Configure removable media controls on the workstations.
• C. Install a web application firewall in the research department.
• D. Install HIDS on each of the research workstations.
B. Configure removable media controls on the workstations.
- A security analyst is running a credential-based vulnerability scanner on a
Windows host. The vulnerability scanner is using the protocol NetBIOS over
TCP/IP to connect to various systems, However, the scan does not return any
results.
To address the issue, the analyst should ensure that which of the following
default ports is open on systems?
• A. 135
• B. 137
• C. 3389
• D. 5060
B. 137
- While reviewing system logs, a security analyst notices that a large number
of end users are changing their passwords four times on the day the passwords
are set to expire. The analyst suspects they are cycling their passwords to
circumvent current password controls.
Which of the following would provide a technical control to prevent this activity
from occurring?
• A. Set password aging requirements.
• B. Increase the password history from three to five.
• C. Create an AUP that prohibits password reuse.
• D. Implement password complexity requirements.
A. Set password aging requirements.
- Which of the following is the MOST significant difference between intrusive
and non-intrusive vulnerability scanning?
• A. One uses credentials, but the other does not.
• B. One has a higher potential for disrupting system operations.
• C. One allows systems to activate firewall countermeasures.
• D. One returns service banners, including running versions.
B. One has a higher potential for disrupting system operations.