Get Full Version of the Exam
A datacenter recently experienced a breach. When access was gained, an RF device was used to access an air-gapped and locked server rack. Which of the following would Best prevent this type of attack?
During a monthly vulnerability scan, a server was flagged for being vulnerable to an Apache Struts exploit. Upon further investigation, the developer responsible for the server informs the security team that Apache Struts is not installed on the server. Which of the following BEST describes how the security team should reach to this incident?
The finding is a false positive and can be disregarded
The Struts module needs to be hardened on the server
The Apache software on the server needs to be patched and updated
The server has been compromised by malware and needs to be quarantined.
Audit logs from a small company#39;s vulnerability scanning software show the following findings: Destinations scanned:
Server001 – Internal human resources payroll server Server101 – Internet-facing web server
Server201 – SQL server for Server101
Server301 – Jumpbox used by systems administrators accessible from the internal network Validated vulnerabilities found:
Server001 – Vulnerable to buffer overflow exploit that may allow attackers to install software Server101 – Vulnerable to buffer overflow exploit that may allow attackers to install software Server201 – OS updates not fully current
Server301 – Accessible from internal network without the use of jumpbox Server301 – Vulnerable to highly publicized exploit that can elevate user privileges
Assuming external attackers who are gaining unauthorized information are of the highest concern, which of the following servers should be addressed FIRST?
A security analyst receives an alert from a WAF with the following payload: var data= quot;lt;test test testgt;quot; lt;../../../../../../etc/passwdgt;quot;
Which of the following types of attacks is this?
Cross-site request forgery
Firewall evasion scipt
As part of the SDLC, a third party is hired to perform a penetration test. The third party will have access to the source code, integration tests, and network diagrams. Which of the following BEST describes the assessment being performed?
The integrity of the data is at risk.
The security of the application relies on antivirus.
A host-based firewall is required.
The application is vulnerable to race conditions.
A system administrator wants to provide for and enforce wireless access accountability during events where external speakers are invited to make presentations to a mixed audience of employees and non-employees. Which of the following should the administrator implement?
A penetration tester finds that a company#39;s login credentials for the email client were client being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?
Enable IPSec and configure SMTP.
Enable SSH and LDAP credentials.
Enable MIME services and POP3.
Enable an SSL certificate for IMAP services.
A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application#39;s full life cycle. Which of the following software development methodologies is the development team using?
Before an infection was detected, several of the infected devices attempted to access a URL that was similar to the company name but with two letters transported. Which of the following BEST describes the attack vector used to infect the devices?