Join the discussion
Question 1/70
When attempting to determine which system or user is generating excessive web traffic, analysis of which of the following would provide the BEST results?
Correct Answer: B
Add Comments
- Other Question (70q)
- Q1. When attempting to determine which system or user is generating excessive web traffic, ana...
- Q2. Which of the following is the FIRST step taken to maintain the chain of custody in a foren...
- Q3. Which of the following data sources could provide indication of a system compromise involv...
- Q4. An organization recently suffered a data breach involving a server that had Transmission C...
- Q5. An employee discovered the default credentials in DB servers, which were found by using a ...
- Q6. Which service is commonly found on port 3306?
- Q7. A web server is under a denial of service (DoS) attack. The administrator reviews logs and...
- Q8. Where are log entries written for auditd in Linux?...
- Q9. A company website was hacked via the following SQL query: email, passwd, login_id, full_na...
- Q10. A security analyst needs to capture network traffic from a compromised Mac host. They atte...
- Q11. Recently, a cybersecurity research lab discovered that there is a hacking group focused on...
- Q12. A forensic analyst has been tasked with analyzing disk images with file extensions such as...
- Q13. An incident responder discovers that the CEO logged in from their New York City office and...
- Q14. An unauthorized network scan may be detected by parsing network sniffer data for:...
- Q15. Which of the following security best practices should a web developer reference when devel...
- Q16. A Linux system administrator found suspicious activity on host IP 192.168.10.121. This hos...
- Q17. When performing an investigation, a security analyst needs to extract information from tex...
- Q18. A security analyst has discovered that an application has failed to run. Which of the foll...
- Q19. Which of the following tools can be used as an intrusion detection system (IDS)? (Choose t...
- Q20. Senior management has stated that antivirus software must be installed on all employee wor...
- Q21. What term means that data is valid and not corrupt?...
- Q22. Which of the following are well-known methods that are used to protect evidence during the...
- Q23. Detailed step-by-step instructions to follow during a security incident are considered:...
- Q24. Which three answer options are password attack methods and techniques? (Choose three.)...
- Q25. Which of the following would MOST likely make a Windows workstation on a corporate network...
- Q26. Which of the following are core functions of SIEM solutions?...
- Q27. If a hacker is attempting to alter or delete system audit logs, in which of the following ...
- Q28. Which of the following digital forensic goals is being provided with hashing and time-stam...
- Q29. After successfully enumerating the target, the hacker determines that the victim is using ...
- Q30. Vulnerability scanners generally classify vulnerabilities by which of the following? (Choo...
- Q31. During an incident, the following actions have been taken: -Executing the malware in a san...
- Q32. Which of the following attack vectors capitalizes on a previously undisclosed issue with a...
- Q33. Which two answer options are the BEST reasons to conduct post-incident reviews after an in...
- Q34. Which of the following sources is best suited for monitoring threats and vulnerabilities?...
- Q35. A computer forensics analyst suspects that some of the pictures recovered from the suspect...
- Q36. What is the primary role of an intrusion detection system (IDS) on a network?...
- Q37. What is the definition of a security breach?
- Q38. A security administrator needs to review events from different systems located worldwide. ...
- Q39. Which approach to cybersecurity involves a series of defensive mechanisms that are layered...
- Q40. A company help desk is flooded with calls regarding systems experiencing slow performance ...
- Q41. An incident response team is concerned with verifying the integrity of security informatio...
- Q42. During a log review, an incident responder is attempting to process the proxy server's log...
- Q43. A system administrator pulls records from a database that only requires the use of their g...
- Q44. After imaging a disk as part of an investigation, a forensics analyst wants to hash the im...
- Q45. An administrator believes that a system on VLAN 12 is Address Resolution Protocol (ARP) po...
- Q46. Which standard was implemented in the United States to protect the privacy of patient medi...
- Q47. After a security breach, a security consultant is hired to perform a vulnerability assessm...
- Q48. A company is reviewing the results of the Nikto scan, and they determined that several int...
- Q49. To minimize vulnerability, which steps should an organization take before deploying a new ...
- Q50. During recovery from an incident, which three options should a company focus on? (Choose t...
- Q51. A security professional discovers a new ransomware strain that disables antivirus on the e...
- Q52. Which term describes the process of collecting logs from many sources across an IT infrast...
- Q53. What are three examples of incident response? (Choose three.)...
- Q54. Which of the following is susceptible to a cache poisoning attack?...
- Q55. Organizations considered "covered entities" are required to adhere to which compliance req...
- Q56. Which of the following enables security personnel to have the BEST security incident recov...
- Q57. An incident responder was asked to analyze malicious traffic. Which of the following tools...
- Q58. During which phase of a vulnerability assessment would a security consultant need to docum...
- Q59. A Windows system administrator has received notification from a security analyst regarding...
- Q60. After a hacker obtained a shell on a Linux box, the hacker then sends the exfiltrated data...
- Q61. While performing routing maintenance on a Windows Server, a technician notices several una...
- Q62. An incident handler is assigned to initiate an incident response for a complex network tha...
- Q63. A security analyst is required to collect detailed network traffic on a virtual machine. W...
- Q64. A security engineer is setting up security information and event management (SIEM). Which ...
- Q65. Which of the following is the BEST way to prevent social engineering attacks?...
- Q66. An organization wants to deploy a network security tool to alert them but not block malici...
- Q67. A system administrator has been tasked with developing highly detailed instructions for pa...
- Q68. Which of the following is a social engineering tactic in which an attacker engages in temp...
- Q69. During an incident, the following actions have been taken: - Executing the malware in a sa...
- Q70. It was recently discovered that many of an organization's servers were running unauthorize...
