<< Prev Question Next Question >>

Question 22/87

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected.
Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack? (Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (87q)
Question 1: A document that appears to be malicious has been discovered ...
Question 2: A development team employs a practice of bringing all the co...
Question 3: A website developer is working on a new e-commerce website a...
Question 4: A security administrator needs to create a RAIS configuratio...
Question 5: A root cause analysis reveals that a web application outage ...
Question 6: Which of the following provides the BEST protection for sens...
Question 7: Which of the following control sets should a well-written BC...
Question 8: Which of the following algorithms has the SMALLEST key size?...
Question 9: A workwide manufacturing company has been experiencing email...
Question 10: Company engineers regularly participate in a public Internet...
Question 11: Several employees return to work the day after attending an ...
Question 12: A company has determined that if its computer-based manufact...
Question 13: The facilities supervisor for a government agency is concern...
Question 14: A security analyst has been asked to investigate a situation...
Question 15: A company is adopting a BYOD policy and is looking for a com...
Question 16: A well-known organization has been experiencing attacks from...
Question 17: A security analyst needs to make a recommendation for restri...
Question 18: A company is designing the layout of a new datacenter so it ...
Question 19: A software developer needs to perform code-execution testing...
Question 20: Which of the following scenarios would make a DNS sinkhole e...
Question 21: Which of the following are requirements that must be configu...
Question 22: A university with remote campuses, which all use different s...
Question 23: A security analyst reviews the datacenter access logs for a ...
Question 24: During an incident response, a security analyst observes the...
Question 25: After reading a security bulletin, a network security manage...
Question 26: The IT department at a university is concerned about profess...
Question 27: Which of the following should be put in place when negotiati...
Question 28: Which of the following job roles would sponsor data quality ...
Question 29: The Chief Executive Officer (CEO) of an organization would l...
Question 30: A security analyst receives a SIEM alert that someone logged...
Question 31: Which of the following will provide the BEST physical securi...
Question 32: A security analyst is investigating an incident to determine...
Question 33: A user recently entered a username and password into a recru...
Question 34: Which of the following is a team of people dedicated testing...
Question 35: Which of the following would be the BEST resource lor a soft...
Question 36: An analyst needs to identify the applications a user was run...
Question 37: The Chief Security Officer (CSO) at a major hospital wants t...
Question 38: A security analyst receives the configuration of a current V...
Question 39: A network administrator is setting up wireless access points...
Question 40: Which of the following disaster recovery tests is The LEAST ...
Question 41: An organization just experienced a major cyberattack modem. ...
Question 42: Which of the following would be the BEST method for creating...
Question 43: A company's bank has reported that multiple corporate credit...
Question 44: A company is upgrading its wireless infrastructure to WPA2-E...
Question 45: A company needs to centralize its logs to create a baseline ...
Question 46: A company's Chief Information Security Officer (CISO) recent...
Question 47: A company provides mobile devices to its users to permit acc...
Question 48: A security engineer needs to Implement the following require...
Question 49: A network engineer needs to create a plan for upgrading the ...
Question 50: Which of the following allows for functional test data to be...
Question 51: An organization suffered an outage and a critical system too...
Question 52: An organization that is located in a flood zone is MOST like...
Question 53: An auditor is performing an assessment of a security applian...
Question 54: A security engineer has enabled two-factor authentication on...
Question 55: The manager who is responsible for a data set has asked a se...
Question 56: A forensics examiner is attempting to dump password cached i...
Question 57: A host was infected with malware. During the incident respon...
Question 58: A security analyst needs to be proactive in understand the t...
Question 59: In the middle of a cybersecurity, a security engineer remove...
Question 60: A security modern may have occurred on the desktop PC of an ...
Question 61: Following a prolonged datacenter outage that affected web-ba...
Question 62: In which of the following common use cases would steganograp...
Question 63: Which of the following would BEST identify and remediate a d...
Question 64: A network technician is installing a guest wireless network ...
Question 65: Users have been issued smart cards that provide physical acc...
Question 66: Joe, an employee, receives an email stating he won the lotte...
Question 67: A security engineer needs to implement an MDM solution that ...
Question 68: A network administrator would like to configure a site-to-si...
Question 69: An organization's help desk is flooded with phone calls from...
Question 70: A technician needs to prevent data loss in a laboratory. The...
Question 71: To secure an application after a large data breach, an e-com...
Question 72: An employee has been charged with fraud and is suspected of ...
Question 73: A security engineer is reviewing log files after a third dis...
Question 74: Which of the following organizational policies are MOST like...
Question 75: A large enterprise has moved all Hs data to the cloud behind...
Question 76: A network engineer is troubleshooting wireless network conne...
Question 77: A company wants to deploy PKI on its Internet-facing website...
Question 78: A network administrator has been alerted that web pages are ...
Question 79: Which of the following policies would help an organization i...
Question 80: A security analyst is looking for a solution to help communi...
Question 81: An organization is developing an authentication service for ...
Question 82: Which of the following scenarios BEST describes a risk reduc...
Question 83: A network administrator has been asked to design a solution ...
Question 84: A financial analyst is expecting an email containing sensiti...
Question 85: A financial organization has adopted a new secure, encrypted...
Question 86: A security analyst sees the following log output while revie...
Question 87: A company recently set up an e-commerce portal to sell its p...