Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A security specialist is notified about

** Please with an explanation if possible **

*Please answers all or leave it to another expert*

Question #:1

A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue?

A. OSCP

B. OID

C. PEM

D. SAN

-------------------------------------------------------------------------------------------------------------

Question #:2

A technician has been asked to document which services are running on each of a collection of 200 servers. Which of the following tools BEST meets this need while minimizing the work required?

A. Nmap

B. Nslookup

C. Netcat

D. Netstat

-------------------------------------------------------------------------------------------------------------

Question #:3

Which of the following explains why a vulnerability scan might return a false positive?

A. The scan is performed at a time of day when the vulnerability does not exist.

B. The test Is performed against the wrong host.

C. The signature matches the product but not the version information.

D. The hosts are evaluated based on an OS-specific profile.

------------------------------------------------------------------------------------------------------------- Question #:4

Which of the following may indicate a configuration item has reached end-of-life?

A. The device will no longer turn on and indicates an error

B. The vendor has not published security patches recently.

C. The object has been removed from the Active Directory.

D. Logs show a performance degradation of the component.

-------------------------------------------------------------------------------------------------------------

Question #:5

A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been Which of the following are considered among the BEST indicators that a received message is a hoax? (Select TWO.)

A. Minimal use of uppercase letters in the message

B. Warnings of monetary loss to the receiver

C. No valid digital signature from a known security organization

D. Claims of possible damage to computer hardware

E. Embedded URLs

------------------------------------------------------------------------------------------------------------- Question #:6

A technician has been asked to document which services are running on An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO). Which of the following is the best NEXT step for the analyst to take?

A. Call the CEO directly to ensure awareness of the event

B. Run a malware scan on the CEO's workstation

C. Reimage the CEO's workstation

D. Disconnect the CEO's workstation from the network.

-------------------------------------------------------------------------------------------------------------

Question #:7

A security analyst is hardening a large-scale wireless network. The primary requirements are the following

* Must use authentication through EAP-TLS certificates

* Must use an AAA server

* Must use the most secure encryption protocol

Given these requirements, which of the following should the analyst implement and recommend? (Select TWO).

A. 802.1X

B. 802.3

C. LDAP

D. TKIP

E. CCMP

F. WPA2-PSK

------------------------------------------------------------------------------------------------------------- Question #:8

A security engineer wants to implement a site-to-site VPN that will require SSL certificates for mutual authentication. Which of the following should the engineer implement if the design requires client MAC address to be visible across the tunnel?

A. Tunnel mode IPSec B. Transport mode VPN IPSec C. L2TP D. SSL VPN

------------------------------------------------------------------------------------------------------------- Question #:9

During certain vulnerability scanning scenarios, It is possible for the target system to react in unexpected ways.

This type of scenario is MOST commonly known as: A . intrusive testing. B . a butter overflow. C . a race condition D . active reconnaissance

------------------------------------------------------------------------------------------------------------- Question #:10

Which of the following BEST distinguishes Agile development from other methodologies in terms of vulnerability management?

Cross-functional teams

Rapid deployments

Daily standups

Peer review

Creating user stories

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Driven Web Sites

Authors: Joline Morrison, Mike Morrison

2nd Edition

? 061906448X, 978-0619064488

More Books

Students also viewed these Databases questions