<< Prev Question Next Question >>

Question 29/93

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (93q)
Question 1: A recently discovered zero-day exploit utilizes an unknown v...
Question 2: An attacker is exploiting a vulnerability that does not have...
Question 3: Which of the following ISO standards is certified for privac...
Question 4: A company wants to deploy PKI on its Internet-facing website...
Question 5: Which of the following relets to applications and systems th...
Question 6: The IT department at a university is concerned about profess...
Question 7: A security analyst needs to make a recommendation for restri...
Question 8: After entering a username and password, and administrator mu...
Question 9: A Chief Information Security Officer (CISO) needs to create ...
Question 10: The SOC is reviewing process and procedures after a recent i...
Question 11: A security analyst is reviewing the output of a web server l...
Question 12: Which of the following describes the BEST approach for deplo...
Question 13: Which of the following job roles would sponsor data quality ...
Question 14: An analyst visits an internet forum looking for information ...
Question 15: A remote user recently took atwo-week vacation abroad and br...
Question 16: Which of the following algorithms has the SMALLEST key size?...
Question 17: Which of the following incident response steps involvesactio...
Question 18: The Chief Financial Officer (CFO) of an insurance company re...
Question 19: Which of the following would be BEST to establish between or...
Question 20: An organization suffered an outage and a critical system too...
Question 21: A security analyst discovers that a company username and pas...
Question 22: A security analyst has received an alert about being sent vi...
Question 23: Following a prolonged datacenter outage that affected web-ba...
Question 24: A startup company is using multiple SaaS and IaaS platforms ...
Question 25: A security analyst is performing a forensic investigation co...
Question 26: A security administrator needs to create a RAIS configuratio...
Question 27: Which of the following types of controls is a turnstile?...
Question 28: A network administrator needs to build out a new datacenter,...
Question 29: A user is concerned that a web application will not be able ...
Question 30: An organization's help desk is flooded with phone calls from...
Question 31: A company has drafted an insider-threat policy that prohibit...
Question 32: Which of the following will MOST likelycause machine learnin...
Question 33: A company is upgrading its wireless infrastructure to WPA2-E...
Question 34: A network administrator would like to configure a site-to-si...
Question 35: A vulnerability assessment report will include the CVSS scor...
Question 36: A security analyst is reviewing information regarding recent...
Question 37: Select the appropriate attack andremediation from each drop-...
Question 38: A network administrator has been asked to install an IDS to ...
Question 39: A manufacturer creates designs for very high security produc...
Question 40: To reduce costs and overhead, an organization wants to move ...
Question 41: A cybersecurity administrator is usingiptables as an enterpr...
Question 42: A network engineer is troubleshooting wireless network conne...
Question 43: A symmetric encryption algorithm Is BEST suited for:...
Question 44: Which of the following are the MOST likely vectors for the u...
Question 45: A malicious actor recently penetration a company's network a...
Question 46: The Chief Executive Officer (CEO) of an organization would l...
Question 47: An analyst has determined that a server was not patched and ...
Question 48: In which ofthe following situations would it be BEST to use ...
Question 49: A security analyst needs to be proactive in understand the t...
Question 50: A large enterprise has moved all Hs data to the cloud behind...
Question 51: Which of the following BEST describes a security exploit for...
Question 52: Anorganization has hired a security analyst to perform a pen...
Question 53: When selecting a technical solution for identity management,...
Question 54: A security analyst has been asked to investigate a situation...
Question 55: An employee has been charged with fraud and is suspected of ...
Question 56: Company engineers regularly participate in a public Internet...
Question 57: A security analyst is investigating an incident to determine...
Question 58: A network engineer needs tocreate a plan for upgrading the w...
Question 59: A user reports constant lag and performance issues with the ...
Question 60: In which of the following risk management strategies would c...
Question 61: A security modern may have occurred on the desktop PC of an ...
Question 62: Several employees return to work the day after attending an ...
Question 63: An organization that is located in a flood zone is MOST like...
Question 64: To secure an application after a large data breach, an e-com...
Question 65: An organization hired a consultant to assist with an active ...
Question 66: A development team employs a practice of bringing all the co...
Question 67: A security analyst is reviewing a new website that will soon...
Question 68: A small business justrecovered from a ransomware attack agai...
Question 69: Joe, a user at a company, clicked an email link led to a web...
2 commentQuestion 70: A security engineer needs to enhance MFA access to sensitive...
Question 71: A consultant is configuring a vulnerability scanner for a la...
Question 72: An enterprise has hired an outside security firm to conductp...
Question 73: Anorganization routes all of its traffic through a VPN Most ...
Question 74: A security analyst sees the following logoutput while review...
Question 75: A commercial cyber-threat intelligence organization observes...
Question 76: A public relations team will be taking a group of guest on a...
Question 77: A smart switch has the ability to monitor electrical levels ...
Question 78: A financial organization has adopted a new secure, encrypted...
Question 79: A network administrator is setting up wireless access points...
Question 80: The IT department's on-site developer has beenwith the team ...
Question 81: A company's Chief Information Security Officer (CISO) recent...
Question 82: A document that appears to be malicious has been discovered ...
Question 83: An attacked is attempting to exploit users by creating a fak...
Question 84: A RAT that was used to compromise an organization's banking ...
Question 85: A root cause analysis reveals that a web application outage ...
Question 86: In which of the following common use cases would steganograp...
Question 87: A company needs to centralize its logs to create a baseline ...
Question 88: A Chief Security Officer (CSO) is concerned about theamount ...
Question 89: An organization has a growing workforce that is mostly drive...
Question 90: An organization's RPO for a critical system is two hours. Th...
Question 91: An incident response technician collected a mobile device du...
Question 92: An analyst needs to set up a method for securely transferrin...
Question 93: In the middle of a cybersecurity, a security engineer remove...