<< Prev Question Next Question >>

Question 21/49

A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an access control list (ACL) to stop the attack. Which of the following technologies could perform these steps automatically in the future?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (49q)
Question 1: A security analyst has discovered that an application has fa...
Question 2: During which of the following attack phases might a request ...
Question 3: Recently, a cybersecurity research lab discovered that there...
Question 4: A Windows system administrator has received notification fro...
Question 5: A company has noticed a trend of attackers gaining access to...
Question 6: When attempting to determine which system or user is generat...
Question 7: Which of the following types of attackers would be MOST like...
Question 8: Senior management has stated that antivirus software must be...
Question 9: Which of the following is a cybersecurity solution for insid...
Question 10: Which of the following data sources could provide indication...
Question 11: An incident responder was asked to analyze malicious traffic...
Question 12: The Key Reinstallation Attack (KRACK) vulnerability is speci...
Question 13: While planning a vulnerability assessment on a computer netw...
Question 14: Which of the following are well-known methods that are used ...
Question 15: During a security investigation, a suspicious Linux laptop i...
Question 16: A network administrator has determined that network performa...
Question 17: Malicious code designed to execute in concurrence with a par...
Question 18: A security investigator has detected an unauthorized insider...
Question 19: An automatic vulnerability scan has been performed. Which is...
Question 20: Detailed step-by-step instructions to follow during a securi...
Question 21: A web server is under a denial of service (DoS) attack. The ...
Question 22: Which of the following technologies would reduce the risk of...
Question 23: According to company policy, all accounts with administrator...
Question 24: Organizations considered "covered entities" are required to ...
Question 25: Which of the following methods are used by attackers to find...
Question 26: Which of the following security best practices should a web ...
Question 27: During the forensic analysis of a compromised computer image...
Question 28: An administrator believes that a system on VLAN 12 is Addres...
Question 29: It was recently discovered that many of an organization's se...
Question 30: After a hacker obtained a shell on a Linux box, the hacker t...
Question 31: Which of the following are legally compliant forensics appli...
Question 32: A network security analyst has noticed a flood of Simple Mai...
Question 33: Which of the following is an automated password cracking tec...
Question 34: A first responder notices a file with a large amount of clip...
Question 35: An incident responder discovers that the CEO logged in from ...
Question 36: Which of the following enables security personnel to have th...
Question 37: Which of the following are part of the hardening phase of th...
Question 38: A company help desk is flooded with calls regarding systems ...
Question 39: It was recently discovered that many of an organization's se...
Question 40: During an incident, the following actions have been taken: -...
Question 41: An incident response team is concerned with verifying the in...
Question 42: Detailed step-by-step instructions to follow during a securi...
Question 43: The Key Reinstallation Attack (KRACK) vulnerability is speci...
Question 44: A system administrator identifies unusual network traffic fr...
Question 45: A company that maintains a public city infrastructure was br...
Question 46: An organization recently suffered a breach due to a human re...
Question 47: An incident at a government agency has occurred and the foll...
Question 48: If a hacker is attempting to alter or delete system audit lo...
Question 49: A security administrator notices a process running on their ...