1. A cybersecurity analyst traced the source of an attack to compromised user credentials. Log analysis revealed that the attacker successfully authenticated from anunauthorized foreign country. Management asked the security analyst to research and implement a solution to help mitigate attacks based on compromisedpasswords. Which of the following should the analyst implement?
A) Single sign-on B) Context-based authentication C) Self-service password reset D) Password complexity
2. A cybersecurity analyst was asked to discover the hardware address of 30 networked assets. From a command line, which of the following tools would be used toprovide ARP scanning and reflects the MOST efficient method for accomplishing the task?
A) nmap B) tracert C) nslookup D) ping a
3. A system administrator who was using an account with elevated privileges deleted a large amount of log files generated by a virtual hypervisor in order to free updisk space. These log files are needed by the security team to analyze the health of the virtual machines. Which of the following compensating controls would helpprevent this from reoccurring? (Select two.)(Select 2answers)
A) Succession planning B) Personnel training C) Separation of duties D) Job rotation E) Mandatory vacation
4. Various devices are connecting and authenticating to a single evil twin within the network. Which of the following are MOST likely being targeted?
A) Mobile devices B) Network infrastructure C) All endpoints D) VPNs E) Wired SCADA devices
5. Scan results identify critical Apache vulnerabilities on a companys web servers. A security analyst believes many of these results are false positives because theweb environment mostly consists of Windows servers.Which of the following is the BEST method of verifying the scan results?
A) Review logs of each host in the SIEM. B) Run a service discovery scan on the identified servers. C) Refer to the identified servers in the asset inventory. D) Perform a top-ports scan against the identified servers.
1. Right Answer: B Explanation:
2. Right Answer: A Explanation: Reference: https://serverfault.com/questions/10590/how-to-get-a-list-of-all-ip-addresses-and-ideally-device-names-on-a-lan
3. Right Answer: B,C Explanation:
4. Right Answer: A Explanation: Reference: http://www.corecom.com/external/livesecurity/eviltwin1.htm
Leave a comment