<< Prev Question Next Question >>

Question 11/36

It was recently discovered that many of an organization's servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (36q)
Question 1: According to Payment Card Industry Data Security Standard (P...
Question 2: A security administrator notices a process running on their ...
Question 3: A security professional discovers a new ransomware strain th...
Question 4: During an incident, the following actions have been taken: -...
Question 5: After imaging a disk as part of an investigation, a forensic...
Question 6: A common formula used to calculate risk is: + Threats + Vuln...
Question 7: During which phase of a vulnerability assessment would a sec...
Question 8: A first responder notices a file with a large amount of clip...
Question 9: A government organization responsible for critical infrastru...
Question 10: The Key Reinstallation Attack (KRACK) vulnerability is speci...
Question 11: It was recently discovered that many of an organization's se...
Question 12: A system administrator identifies unusual network traffic fr...
Question 13: Which of the following is the GREATEST risk of having securi...
Question 14: An attacker intercepts a hash and compares it to pre-compute...
Question 15: As part of an organization's regular maintenance activities,...
Question 16: Which of the following, when exposed together, constitutes P...
Question 17: To minimize vulnerability, which steps should an organizatio...
Question 18: Which of the following could be useful to an organization th...
Question 19: An incident responder discovers that the CEO logged in from ...
Question 20: Which asset would be the MOST desirable for a financially mo...
Question 21: An incident responder was asked to analyze malicious traffic...
Question 22: When attempting to determine which system or user is generat...
Question 23: While planning a vulnerability assessment on a computer netw...
Question 24: Tcpdump is a tool that can be used to detect which of the fo...
Question 25: A company has noticed a trend of attackers gaining access to...
Question 26: An organization recently suffered a breach due to a human re...
Question 27: When tracing an attack to the point of origin, which of the ...
Question 28: Which of the following are common areas of vulnerabilities i...
Question 29: Which of the following would MOST likely make a Windows work...
Question 30: A security analyst is required to collect detailed network t...
Question 31: Which of the following are legally compliant forensics appli...
Question 32: Which of the following is an automated password cracking tec...
Question 33: Senior management has stated that antivirus software must be...
Question 34: Network infrastructure has been scanned and the identified i...
Question 35: Which of the following are part of the hardening phase of th...
Question 36: An incident handler is assigned to initiate an incident resp...