1. An executive tasked a security analyst to aggregate past logs, traffic, and alerts on a particular attack vector. The analyst was then tasked with analyzing the dataand making predictions on future complications regarding this attack vector. Which of the following types of analysis is the security analyst MOST likely conducting?
A) Business analysis B) Trend analysis C) Behavior analysis D) Availability analysis
2. An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those servicesand port. Which of the following should the analyst use?
A) Wireshark B) netstat C) Qualys D) ping E) nmap
3. Which of the following is MOST effective for correlation analysis by log for threat management?
A) SCAP B) IPS C) PCAP D) SIEM
4. In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan ofthe network returned 5,682 possible vulnerabilities. The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues. Whichof the following is the BEST way to proceed?
A) Hold off on additional scanning until the current list of vulnerabilities have been resolved. B) Place assets that handle PHI in a sandbox environment, and then resolve all vulnerabilities. C) Attempt to identify all false positives and exceptions, and then resolve all remaining items. D) Reduce the scan to items identified as critical in the asset inventory, and resolve these issues first.
5. Which of the following is a feature of virtualization that can potentially create a single point of failure?
A) Load balancing hypervisors B) Faster server provisioning C) Server consolidation D) Running multiple OS instances
Leave a comment