<< Prev Question Next Question >>

Question 18/60

You have determined that an attack is currently underway on your database server. An attacker is currently logged in, modifying data. You want to preserve logs, caching and other data on this affected server.
Which of the following actions will best allow you to stop the attack and still preserve data?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (60q)
Question 1: What is the primary use of hash (one-way) encryption in netw...
Question 2: Which of the following is a typical target of a trojan on a ...
Question 3: You want to create a quick solution that allows you to obtai...
Question 4: Which of the following is the most likely first step to enab...
Question 5: A security breach has occurred involving the company e-comme...
Question 6: You are creating an information security policy for your com...
Question 7: A distributed denial-of-service (DDOS) attack has occurred w...
Question 8: What is the first tool needed to create a secure networking ...
Question 9: Which of the following is a primary weakness of asymmetric-k...
Question 10: Which of the following standards is used for digital certifi...
Question 11: You have implemented a version of the Kerberos protocol for ...
Question 12: Consider the following image: (Exhibit) From the information...
Question 13: An application is creating hashes of each file on an attache...
Question 14: Consider the following image of a packet capture: (Exhibit) ...
Question 15: You have been assigned to provide security measures for your...
Question 16: You have implemented a service on a Linux system that allows...
Question 17: A new server has been placed on the network. You have been a...
Question 18: You have determined that an attack is currently underway on ...
Question 19: A disgruntled employee has discovered that the company Web s...
Question 20: You want to create a certificate for use in a Secure Sockets...
Question 21: Which of the following is considered to be the most secure d...
Question 22: Your organization has made a particularly unpopular policy d...
Question 23: A security breach has occurred in which a third party was ab...
Question 24: Which of the following can help you authoritatively trace a ...
Question 25: Jason is attempting to gain unauthorized access to a corpora...
Question 26: Requests for Web-based resources have become unacceptably sl...
Question 27: Irina has contracted with a company to provide Web design co...
Question 28: Which of the following organizations provides regular update...
Question 29: Which of the following applications can help determine wheth...
Question 30: Which choice lists typical firewall functions?...
Question 31: You have just deployed an application that uses hash-based c...
Question 32: You have determined that the company Web server has several ...
Question 33: Consider the following image of a packet capture: (Exhibit) ...
Question 34: Which of the following is a common problem, yet commonly ove...
Question 35: What is the primary drawback of using symmetric-key encrypti...
Question 36: Which of the following errors most commonly occurs when resp...
1 commentQuestion 37: Which of the following describes the practice of stateful mu...
Question 38: Which of the following will best help you ensure a database ...
Question 39: Which of the following is most likely to address a problem w...
Question 40: You are using a PKI solution that is based on Secure Sockets...
Question 41: You have been asked to encrypt a large file using a secure e...
Question 42: You have been assigned to configure a DMZ that uses multiple...
Question 43: Which of the following details should be included in documen...
Question 44: Which of the following is the primary weakness of symmetric-...
Question 45: At what layer of the OSI/RM does a packet filter operate?...
Question 46: Which of the following activities is the most effective at k...
Question 47: Consider the following diagram: (Exhibit) Which of the follo...
Question 48: You have discovered that the ls, su and ps commands no longe...
Question 49: Consider the following diagram: (Exhibit) Which type of atta...
Question 50: Which of the following is most likely to pose a security thr...
Question 51: Consider the following series of commands from a Linux syste...
Question 52: Which of the following is a primary auditing activity?...
Question 53: The most popular types of proxy-oriented firewalls operate a...
Question 54: A new video conferencing device has been installed on the ne...
Question 55: What is the primary strength of symmetric-key encryption?...
Question 56: At the beginning of an IPsec session, which activity occurs ...
Question 57: Which algorithm can use a 128-bit key, and has been adopted ...
Question 58: Consider the following diagram involving two firewall-protec...
Question 59: A CGI application on the company's Web server has a bug writ...
Question 60: The best way to thwart a dictionary attack is by enforcing a...