<< Prev Question Next Question >>

Question 25/35

A network security analyst has noticed a flood of Simple Mail Transfer Protocol (SMTP) traffic to internal clients. SMTP traffic should only be allowed to email servers. Which of the following commands would stop this attack? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (35q)
Question 1: An incident responder discovers that the CEO logged in from ...
Question 2: During which phase of a vulnerability assessment would a sec...
Question 3: Malicious code designed to execute in concurrence with a par...
Question 4: A security investigator has detected an unauthorized insider...
Question 5: To minimize vulnerability, which steps should an organizatio...
Question 6: A company has noticed a trend of attackers gaining access to...
Question 7: Which of the following are common areas of vulnerabilities i...
Question 8: An incident response team is concerned with verifying the in...
Question 9: During a security investigation, a suspicious Linux laptop i...
Question 10: Recently, a cybersecurity research lab discovered that there...
Question 11: Which of the following is the FIRST step taken to maintain t...
Question 12: When tracing an attack to the point of origin, which of the ...
Question 13: After a security breach, a security consultant is hired to p...
Question 14: Senior management has stated that antivirus software must be...
Question 15: The Key Reinstallation Attack (KRACK) vulnerability is speci...
Question 16: During a malware-driven distributed denial of service attack...
Question 17: Which of the following types of attackers would be MOST like...
Question 18: An administrator investigating intermittent network communic...
Question 19: Which of the following methods are used by attackers to find...
Question 20: An incident at a government agency has occurred and the foll...
Question 21: Which common source of vulnerability should be addressed to ...
Question 22: An incident responder has collected network capture logs in ...
Question 23: Various logs are collected for a data leakage case to make a...
Question 24: An incident handler is assigned to initiate an incident resp...
Question 25: A network security analyst has noticed a flood of Simple Mai...
Question 26: A secretary receives an email from a friend with a picture o...
Question 27: According to Payment Card Industry Data Security Standard (P...
Question 28: Which of the following are well-known methods that are used ...
Question 29: Organizations considered "covered entities" are required to ...
Question 30: Which of the following are legally compliant forensics appli...
Question 31: An administrator believes that a system on VLAN 12 is Addres...
Question 32: Which of the following is an automated password cracking tec...
Question 33: A web server is under a denial of service (DoS) attack. The ...
Question 34: A security administrator needs to review events from differe...
Question 35: An unauthorized network scan may be detected by parsing netw...