<< Prev Question Next Question >>

Question 28/50

A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (50q)
Question 1: An auditor wants to test the security posture of an organiza...
Question 2: Which of the following would a security specialist be able t...
Question 3: A company is currently using the following configuration: A ...
Question 4: An organization has determined it can tolerate a maximum of ...
Question 5: Which of the following best describes routine in which semic...
Question 6: A security analyst wishes to increase the security of an FTP...
Question 7: As part of a new industry regulation, companies are required...
Question 8: In a corporation where compute utilization spikes several ti...
1 commentQuestion 9: A security administrator is reviewing the following network ...
Question 10: A security administrator receives an alert from a third-part...
Question 11: A systems administrator is reviewing the following informati...
Question 12: A company is using a mobile device deployment model in which...
Question 13: HOTSPOT Select the appropriate attack from each drop down li...
Question 14: DRAG DROP A Security administrator wants to implement strong...
Question 15: Refer to the following code: (Exhibit) Which of the followin...
Question 16: Multiple organizations operating in the same vertical wants ...
Question 17: Which of the following explains why vendors publish MD5 valu...
Question 18: An organization's internal auditor discovers that large sums...
Question 19: An organization is using a tool to perform a source code rev...
Question 20: DRAG DROP Drag and drop the correct protocol to its default ...
Question 21: Which of the following can be provided to an AAA system for ...
Question 22: Which of the following implements two-factor authentication?...
Question 23: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 24: A senior incident response manager receives a call about som...
Question 25: When systems, hardware, or software are not supported by the...
Question 26: A company has a data system with definitions for "Private" a...
Question 27: A user clicked an email link that led to a website than infe...
Question 28: A company hires a consulting firm to crawl its Active Direct...
1 commentQuestion 29: After a user reports slow computer performance, a system adm...
Question 30: A company is terminating an employee for misbehavior. Which ...
Question 31: DRAG DROP A forensic analyst is asked to respond to an ongoi...
Question 32: Which of the following is an important step to take BEFORE m...
Question 33: A systems administrator is attempting to recover from a cata...
Question 34: A database backup schedule consists of weekly full backups p...
Question 35: Which of the following threat actors is MOST likely to steal...
Question 36: An administrator is replacing a wireless router. The configu...
Question 37: Which of the following attacks specifically impact data avai...
Question 38: An analyst wants to implement a more secure wireless authent...
Question 39: Two users need to send each other emails over unsecured chan...
Question 40: Malicious traffic from an internal network has been detected...
Question 41: Which of the following characteristics differentiate a rainb...
Question 42: A high-security defense installation recently begun utilizin...
Question 43: Which of the following cryptographic attacks would salting o...
Question 44: When configuring settings in a mandatory access control envi...
Question 45: An incident responder receives a call from a user who report...
Question 46: A user has attempted to access data at a higher classificati...
Question 47: An application team is performing a load-balancing test for ...
Question 48: Ann. An employee in the payroll department, has contacted th...
Question 49: Which of the following BEST describes a network-based attack...
Question 50: Joe, an employee, wants to show his colleagues how much he k...