- (Exam Topic 2)
When reviewing a compromised authentication server, a security analyst discovers the following hidden file:
Further analysis shows these users never logged in to the server. Which of the following types of attacks was used to obtain the file and what should the analyst recommend to prevent this type of attack from reoccurring?
Correct Answer:
B
- (Exam Topic 2)
A company’s data is still being exfiltered to business competitors after the implementation of a DLP solution. Which of the following is the most likely reason why the data is still being compromised?
Correct Answer:
B
- (Exam Topic 2)
A security analyst received a series of antivirus alerts from a workstation segment, and users reported ransomware messages. During lessons- learned activities, the analyst determines the antivirus was able to alert to abnormal behavior but did not stop this newest variant of ransomware. Which of the following actions should be taken to BEST mitigate the effects of this type of threat in the future?
Correct Answer:
B
- (Exam Topic 1)
A security administrator needs to create an IDS rule to alert on FTP login attempts by root. Which of the following rules is the BEST solution?
Correct Answer:
B
- (Exam Topic 3)
An organization is experiencing security incidents in which a systems administrator is creating unauthorized user accounts A security analyst has created a script to snapshot the system configuration each day. Following iss one of the scripts:
This script has been running successfully every day. Which of the following commands would provide the analyst with additional useful information relevant to the above script?
A)
B)
C)
D)
Correct Answer:
B