- (Exam Topic 3)
During a network reconnaissance engagement, a penetration tester was given perimeter firewall ACLs to accelerate the scanning process. The penetration tester has decided to concentrate on trying to brute force log in to destination IP address 192.168.192.132 via secure shell.
< ><>>< >
Correct Answer:
C
- (Exam Topic 2)
A zero-day crypto-worm is quickly spreading through the internal network on port 25 and exploiting a software vulnerability found within the email servers.
Which of the following countermeasures needs to be implemented as soon as possible to mitigate the worm from continuing to spread?
Correct Answer:
C
- (Exam Topic 1)
Which of the following is MOST effective for correlation analysis by log for threat management?
Correct Answer:
D
- (Exam Topic 2)
During a routine network scan, a security administrator discovered an unidentified service running on a new embedded and unmanaged HVAC controller, which is used to monitor the company’s datacenter:
<>
Correct Answer:
A
- (Exam Topic 2)
A security analyst is attempting to configure a vulnerability scan for a new segment on the network. Given the requirement to prevent credentials from traversing the network while still conducting a credentialed scan, which of the following is the BEST choice?
Correct Answer:
A