Question
Security and Assessment and Testing One of the actions that attackers typically attempt after compromising a system is to acquire the ability to mimic a
Security and Assessment and Testing
One of the actions that attackers typically attempt after compromising a system is to acquire the ability to mimic a normal privileged user. What is one way in which they may accomplish this?
a. | Rebooting the compromised host | |
b. | Exporting the password hash table | |
c. | Pivoting from the compromised host to another target | |
d. | Adding a privileged user account |
3.85 points
QUESTION 3
Which of the following is not normally an element of user accounts management audits?
a. | Suspended accounts | |
b. | Signed AUPs | |
c. | Password hashing | |
d. | Privileged accounts |
3.85 points
QUESTION 4
Vulnerability scans normally involve all of the following except which one?
a. | The identification of active hosts on the network | |
b. | The identification of operating systems | |
c. | The identification of malware on all hosts | |
d. | The identification of misconfigured settings |
3.85 points
QUESTION 5
Synthetic transactions are best described as
a. | Transactions that are synthesized from multiple users interactions with the system | |
b. | Real user monitoring (RUM) | |
c. | A way to test the behavior and performance of critical services | |
d. | Transactions that fall outside the normal purpose of a system |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started