<< Prev Question Next Question >>

Question 21/36

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization's server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (36q)
Question 1: During which of the following attack phases might a request ...
Question 2: An organization recently suffered a breach due to a human re...
Question 3: During a security investigation, a suspicious Linux laptop i...
Question 4: Which of the following data sources could provide indication...
Question 5: After a security breach, a security consultant is hired to p...
Question 6: Which of the following is a cybersecurity solution for insid...
Question 7: According to company policy, all accounts with administrator...
Question 8: Which of the following, when exposed together, constitutes P...
Question 9: An automatic vulnerability scan has been performed. Which is...
Question 10: Various logs are collected for a data leakage case to make a...
Question 11: Which of the following are common areas of vulnerabilities i...
Question 12: Which of the following is a method of reconnaissance in whic...
Question 13: After a hacker obtained a shell on a Linux box, the hacker t...
Question 14: A user receives an email about an unfamiliar bank transactio...
Question 15: A security administrator notices a process running on their ...
Question 16: During which phase of a vulnerability assessment would a sec...
Question 17: Which of the following characteristics of a web proxy streng...
Question 18: Which of the following are well-known methods that are used ...
Question 19: Nmap is a tool most commonly used to:...
Question 20: Detailed step-by-step instructions to follow during a securi...
Question 21: While reviewing some audit logs, an analyst has identified c...
Question 22: An unauthorized network scan may be detected by parsing netw...
Question 23: Which of the following types of attackers would be MOST like...
Question 24: Which asset would be the MOST desirable for a financially mo...
Question 25: A Windows system administrator has received notification fro...
Question 26: Which of the following security best practices should a web ...
Question 27: When attempting to determine which system or user is generat...
Question 28: A first responder notices a file with a large amount of clip...
Question 29: It was recently discovered that many of an organization's se...
Question 30: A government organization responsible for critical infrastru...
Question 31: Which of the following methods are used by attackers to find...
Question 32: A security analyst is required to collect detailed network t...
Question 33: During an incident, the following actions have been taken: -...
Question 34: A security administrator is investigating a compromised host...
Question 35: If a hacker is attempting to alter or delete system audit lo...
Question 36: An incident responder has collected network capture logs in ...