associated with it, and then make recommendations to add additionalcompensating controls like firewall configurations, adding a WAF, providingsegmentation, and other configurations outside the appliance to minimize thevulnerabilities it presents.Question 43:SkippedWhich of the following tools would you use to audit a multi-cloudenvironment?ProwlerPacuScoutSuite(Correct)OpenVASExplanationOBJ-1.4: OBJ-1.4: ScoutSuite is used to audit instances and policies created onmulti-cloud platforms. Prowler is a cloud auditing tool, but it can only be used onAWS. Pacu is an exploitation framework that is used to test the securityconfigurations of an AWS account. OpenVAS is a general-purpose vulnerabilityscanner, but does not deal with cloud-specific issues.Question 44:SkippedWhat remediation strategies are the MOST effective in reducing therisk to an embedded ICS from a network-based compromise? (SelectTWO)NIDS Show
Which of the following types of digital forensic investigations is most challenging due to the on-demand nature of the analyzed assets?
Answer : A SOC analyst has detected the repeated usage of a compromised user credential on the company's email server. The analyst sends you an email asking you to check the server for any indicators of compromise since the email server is critical to continued business operations. Which of the following was likely overlooked by your organization during the incident response preparation phase?
Answer : You have been hired to investigate a possible insider threat from a user named Terri. Which of the following commands would successfully look through all the log files in "/var/log" for any references to "Terri" or "terri" on a Linux server?
Answer : CompTIA MB0-001 Mobility+ Certification Practice Exam Set 6 According to the US Department of Health and Human Services, notification of the individuals affected by a data breach containing PHI is required when how many individuals are affected?
Answer : Which of the following types of output encoding is being used in the following output?
Answer : A penetration tester has been hired to conduct an assessment, but the company wants to exclude social engineering from the list of authorized activities. Which of the following documents would include this limitation?
Answer : CompTIA LX0-102 Linux Part 2 Certification Practice Exam Set 1 As a SOC analyst, you receive an alert concerning a dramatic slowdown affecting the company's e-commerce server due to the load balancer's critical failure. Your company depends on online sales for all of its business, and you know the immediate impact of this event will be a loss of sales. Which of the following is an appropriate classification of the impact in terms of the total impact and notification requirements? (SELECT THREE)
Answer : Which of the following types of information is protected by rules in the United States that specify the minimum frequency of vulnerability scanning required for devices that process it?
Answer : Edward's bank recently suffered an attack where an employee made an unauthorized modification to a customer's bank balance. Which tenant of cybersecurity was violated by this employee's actions?
Answer : CompTIA Security+ SY0-501 Practice Exams and Tests Set 7 Fail To Pass Systems has just been the victim of another embarrassing data breach. Their database administrator needed to work from home this weekend, so he downloaded the corporate database to his work laptop. On his way home, he left the laptop in an Uber, and a few days later, the data was posted on the internet. Which of the following mitigations would have provided the greatest protection against this data breach?
Answer : Your organization requires the use of TLS or IPSec for all communications with an organization's network. Which of the following is this an example of?
Answer : Which of the following type of solutions would you classify an FPGA as?
Answer : JK0-015 CompTIA E2C Security+ 2008 Edition Practice Exam Set 4
If an administrator cannot fully remediate a vulnerability, which of the following should they implement?
Answer : What role does the red team perform during a tabletop exercise (TTX)?
Answer : What document typically contains high-level statements of management intent?
Answer : CompTIA JK0-022 E2C Security+ Threats & Vulnerabilities Exam Set 2 You were interpreting a Nessus vulnerability scan report and identified a vulnerability in the system with a CVSS attack vector rating of A. Based on this information, which of the following statements would be true?
Answer : You are analyzing the SIEM for your company's e-commerce server when you notice the following URL in the logs of your
SIEM:
Answer : Your company is making a significant investment in infrastructure-as-a-service (IaaS) hosting to replace its data centers. Which of the following techniques should be used to mitigate the risk of data remanence when moving virtual hosts from one server to another in the cloud?
Answer : CompTIA PD1-001 PDI+ Beta Certification Practice Exam Set 8 A vulnerability scan has returned the following results: -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Detailed Results Windows Shares Enumeration Results: -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- What best describes the meaning of this output?
Answer : In which phase of the security intelligence cycle is published information relevant to security issues provided to those who need to act on that information?
Answer : Which of the following techniques listed below are not appropriate to use during a passive reconnaissance exercise against a specific target company?
Answer : CompTIA N10-004 Network+ Certification Practice Test Set 1 A cybersecurity analyst is reviewing the logs of a Citrix NetScaler Gateway running on a FreeBSD 8.4 server and saw the following output: -=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=- 10.1.1.1 - - [10/Jan/2020:13:23:51 +0000] "POST /vpn/../vpns/portal/scripts/newbm.pl HTTP/1.1" 200 143 "https://10.1.1.2/" "USERAGENT " 10.1.1.1 - - [10/Jan/2020:13:23:53 +0000] "GET /vpn/../vpns/portal/backdoor.xml HTTP/1.1" 200 941 "-" "USERAGENT" 10.1.1.1 - - [10/Jan/2020:16:12:31 +0000] "POST /vpns/portal/scripts/newbm.pl HTTP/1.1" 200 143 "https://10.1.1.2/" "USERAGENT" -=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=--=-=-=-=- What type of attack was most likely being attempted by the attacker?
Answer : What is a reverse proxy commonly used for?
Answer : Which of the following types of attackers are sophisticated and highly organized people or teams typically sponsored by a nation-state?
Answer : CompTIA Security+ SY0 401 Test Set 2 If you want to conduct an operating system identification during a nmap scan, which syntax should you utilize?
Answer : Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?
Answer : Which term defines the collection of all points from which an adversary could interact with a system and cause it to function in a way other than how it was designed?
Answer : CV0-001 CompTIA Cloud+ Certification Practice Exam Set 6 You are analyzing the logs of a web server and see the following entry: -=-=-=-=-=--=-=-=-=-=--=-=-=-=-=- 192.168.1.25
� � [05/Aug/2020:15:16:42 -0400] �GET /%27%27;!�%22%3CDION%3E=&{() -=-=-=-=-=--=-=-=-=-=--=-=-=-=-=- Based on this entry, which of the following attacks was attempted?
Answer : Which of the following vulnerability scans would provide the best results if you want to determine if the target's configuration settings are correct?
Answer
: Which of the following is the default nmap scan type when you do not provide a flag when issuing the command?
Answer : CompTIA A+ (220-1001) Practice Exams (Over 500 questions!) Set 22 Which of the following is the most difficult to confirm with an external vulnerability scan?
Answer : You identified a critical vulnerability in one of your organization's databases. You researched a solution, but it will require the server to be taken offline during the patch installation. You have received permission from the Change Advisory Board to implement this emergency change at 11 pm once everyone has left the office. It is now 3 pm; what action(s) should you take now to best prepare for implementing this evening's change? (SELECT ALL THAT APPLY)
Answer : Dion Consulting Group has recently received a contract to develop a networked control system for a self-driving car. The company's CIO is concerned about the liability of a security vulnerability being exploited that may result in the death of a passenger or an innocent bystander. Which of the following methodologies would provide the single greatest mitigation if successfully implemented?
Answer : FC0-U41 CompTIA Strata IT Fundamentals Practice Test Set 3 What method might a system administrator use to replicate the DNS information from one DNS server to another, but could also be used maliciously by an attacker?
Answer
: Nicole's organization does not have the budget or staff to conduct 24/7 security monitoring of their network. To supplement her team, she contracts with a managed SOC service. Which of the following services or providers would be best suited for this role?
Answer : James is working with the software development team to integrate real-time security reviews into some of their SDLC processes. Which of the following would best meet this requirement?
Answer : CompTIA JK0-018 Security+ E2C Certification Practice Exam Set 5 What control provides the best protection against both SQL injection and cross-site scripting attacks?
Answer : Which of the following secure coding best practices ensures special characters like <, >, /, and � are not accepted from the user via a web form?
Answer : Which of the following is not a recognized adversarial attack vector according to the MITRE ATT&CK framework?
Answer : CompTIA Security+ SY0-501 Practice Exams and Tests Set 15 Which of the following protocols could be used inside a virtual system to manage and monitor the network?
Answer : Which term refers to the consistent and tamper-resistant operation of every element within an enterprise?
Answer : A web developer wants to protect their new web application from a man-in-the-middle attack. Which of the following controls would best prevent an attacker from stealing tokens stored in cookies?
Answer : CompTIA A+ (220-1001) Practice Exams (Over 500 questions!) Set 3 Which of the following vulnerabilities can be prevented by using proper input validation? (SELECT ANY THAT APPLY)
Answer : Which of the following is the most important feature to consider when designing a system on a chip?
Answer : DeepScan supports data-flow analysis and understands the execution flow of a program. It allows you to see possible security flaws without executing the code. Which of the following types of tools would DeepScan be classified as?
Answer : JK0-017 CompTIA E2C Project+ Certification Practice Exam Set 1 As attackers have learned to evade traditional signature-based solutions, such as firewalls and anti-virus software, an analytics-based approach within the IT security industry is increasingly important for organizations. CompTIA CySA+ applies behavioral analytics to networks to improve the overall state of security through identifying and combating malware and advanced persistent threats (APTs), resulting in an enhanced threat visibility across a broad attack surface. It will validate an IT professional's ability to proactively defend and continuously improve the security of an organization. CySA+ will verify the successful candidate has the knowledge and skills required to:
Which of the following secure coding best practices ensures a character like is translated into the < string When writing to an HTML page?Which of the following secure coding best practices ensures a character like < is translated into the < string when writing to an HTML page? C. Ensuring that each console has its own unique key will allow the console manufacturer to track who has purchased which games when using digital rights management licensing.
Which of the following techniques should be used to mitigate the risk of data remanence when moving virtual hosts from one server to another in the cloud?Which of the following techniques should be used to mitigate the risk of data remanence when moving virtual hosts from one server to another in the cloud? OBJ-1.3: To mitigate the risk of data remanence, you should implement full disk encryption.
Which of the following security controls provides Windows system administrators with an efficient way to deploy system configuration settings across many devices?What security control provides Windows administrators with an efficient way to manage system configuration settings across a large number of devices? Options are : Patch management.
Which of the following types of digital forensic investigations is most challenging due to the on demand nature of the analyzed assets?Which of the following types of digital forensic investigations is most challenging due to the on-demand nature of the analyzed assets? The on-demand nature of cloud services means that instances are often created and destroyed again, with no real opportunity for forensic recovery of any data.
|