1. A security analyst is conducting traffic analysis and observes an HTTP POST to a web server. The POST header is approximately 1000 bytes in length. Duringtransmission, one byte is delivered every ten seconds. Which of the following attacks is the traffic indicative of?
A) DoS B) SQL injection C) Exfiltration D) Buffer overflow
2. A security analyst has determined that the user interface on an embedded device is vulnerable to common SQL injections. The device is unable to be replaced, andthe software cannot be upgraded. Which of the following should the security analyst recommend to add additional security to this device?
A) The security analyst should recommend this device be included in regular vulnerability scans. B) The security analyst should recommend this device regularly export the web logs to a SIEM system. C) The security analyst should recommend an IDS be placed on the network segment. D) The security analyst should recommend this device be placed behind a WAF.
3. A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker fromlearning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
A) TCP B) SMTP C) ICMP D) ARP
4. Which of the following represent the reasoning behind careful selection of the timelines and time-of-day boundaries for an authorized penetration test? (SelectTWO).(Select 2answers)
A) To avoid conflicts with real intrusions that may occur B) To schedule personnel resources required for test activities C) To mitigate unintended impacts to operations D) To ensure tests have measurable impact to operations E) To determine frequency of team communication and reporting
5. A malware infection spread to numerous workstations within the marketing department. The workstations were quarantined and replaced with machines.Which of the following represents a FINAL step in the eradication of the malware?
A) The workstations should be patched and scanned. B) The workstations should be donated for reuse. C) The workstations should be isolated from the network. D) The workstations should be reimaged.
Leave a comment