- (Exam Topic 2)
During a review of vulnerability scan results an analyst determines the results may be flawed because a
control-baseline system which is used to evaluate a scanning tools effectiveness was reported as not vulnerable Consequently, the analyst verifies the scope of the scan included the control-baseline host which was available on the network during the scan. The use of a control-baseline endpoint in this scenario assists the analyst in confirming.
Correct Answer:
A
- (Exam Topic 3)
A company experienced a security compromise due to the inappropriate disposal of one of its hardware
appliances. Sensitive information stored on the hardware appliance was not removed prior to disposal. Which of the following is the BEST manner in which to dispose of the hardware appliance?
Correct Answer:
B
- (Exam Topic 3)
A secutily analyst is reviewing WAF alerts and sees the following request:
Which of the following BEST describes the attack?
Correct Answer:
A
- (Exam Topic 3)
Some hard disks need to be taken as evidence for further analysis during an incident response Which of the following procedures must be completed FIRST for this type of evtdertce acquisition?
Correct Answer:
B
- (Exam Topic 2)
When reviewing a compromised authentication server, a security analyst discovers the following hidden file:
Further analysis shows these users never logged in to the server. Which of the following types of attacks was used to obtain the file and what should the analyst recommend to prevent this type of attack from reoccurring?
Correct Answer:
B