- (Exam Topic 1)
An employee received a word processing file that was delivered as an email attachment The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Correct Answer:
B
- (Exam Topic 3)
A network administrator has been asked to design a solution to improve a company's security posture The administrator is given the following, requirements?
• The solution must be inline in the network
• The solution must be able to block known malicious traffic
• The solution must be able to stop network-based attacks
Which of the following should the network administrator implement to BEST meet these requirements?
Correct Answer:
D
- (Exam Topic 1)
A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output:
Which of the following is MOST likely occurring?
Correct Answer:
B
- (Exam Topic 3)
On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)
Correct Answer:
EF
- (Exam Topic 1)
A security analyst wants to fingerpnnt a web server Which of the following tools will the security analyst MOST likely use to accomplish this task?
Correct Answer:
C
HTTP/1.1 301 Moved Permanently Server: cloudflare
Date: Thu, 01 Sep 2022 22:36:50 GMT
Content-Type: text/html Content-Length: 167 Connection: keep-alive Location: https://1.1.1.1/
CF-RAY: 74417cb04d6b9a50-MFE