1. A companys asset management software has been discovering a weekly increase in non-standard software installed on end users machines with duplicate licensekeys. The security analyst wants to know if any of this software is listening on any non-standard ports, such as 6667. Which of the following tools should the analystrecommend to block any command and control traffic?
A) IPS B) HIDS C) Netstat D) NIDS
2. A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a. Whichof the following attacks may be occurring?
A) Man-in-the-middle attack B) Smurf attack C) Format string attack D) Buffer overflow attack E) Denial of service attack
3. Considering confidentiality and integrity, which of the following make servers more secure than desktops? (Select THREE).(Select 3answers)
A) OS B) Physical access restriction C) Processing power D) Trained operators E) Hard drive capacity F) VLANs
4. An organization uses Common Vulnerability Scoring System (CVSS) scores to prioritize remediation of vulnerabilities.Management wants to modify the priorities based on a difficulty factor so that vulnerabilities with lower CVSS scores may get a higher priority if they are easier toimplement with less risk to system functionality. Management also wants to quantify the priority. Which of the following would achieve managements objective?
A) (CVSS Score) * Difficulty = Priority Where Difficulty is a range from 0.1 to 1.0 with 1.0 being easiest and lowest risk to implement B) (CVSS Score) / Difficulty = Priority Where Difficulty is a range from 1 to 10 with 10 being easiest and lowest risk to implement C) ((CVSS Score) * 2) / Difficulty = Priority Where CVSS Score is weighted and Difficulty is a range from 1 to 5 with 5 being easiest and lowest risk to implement D) (CVSS Score) * Difficulty = Priority Where Difficulty is a range from 1 to 5 with 1 being easiest and lowest risk to implement
5. A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performingslowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which of thefollowing can be implemented to maintain the availability of the website?
A) VPN B) Honeypot C) Whitelisting D) DMZ E) MAC filtering
Leave a comment