1. A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker fromlearning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
A) ICMP B) SMTP C) TCP D) ARP
2. A database administrator contacts a security administrator to request firewall changes for a connection to a new internal application.The security administrator notices that the new application uses a port typically monopolized by a virus.The security administrator denies the request and suggests a new port or service be used to complete the applications task.Which of the following is the security administrator practicing in this example?
A) Implicit deny B) Access control lists C) Explicit deny D) Port security
3. An analyst is troubleshooting a PC that is experiencing high processor and memory consumption. Investigation reveals the following processes are running on thesystem: lsass.exe csrss.exe wordpad.exe notepad.exeWhich of the following tools should the analyst utilize to determine the rogue process?
A) Ping 127.0.0.1. B) Use Netstat. C) Use Nessus. D) Use grep to search.
4. A production web server is experiencing performance issues. Upon investigation, new unauthorized applications have been installed and suspicious traffic was sentthrough an unused port. Endpoint security is not detecting any malware or virus. Which of the following types of threats would this MOST likely be classified as?
A) Botnet B) Advanced persistent threat C) Zero day D) Buffer overflow vulnerability
5. Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)(Select 2answers)
A) Firewalling B) Segmentation C) Patching D) NIDS E) Disabling unused services
Leave a comment