<< Prev Question Next Question >>

Question 12/132

A security analyst is investigating a vulnerability in which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management.
Which of the following tools can the analyst use to verify the permissions?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (132q)
Question 1: A security engineer is reviewing log files after a third dis...
Question 2: A smart switch has the ability to monitor electrical levels ...
Question 3: A technician needs to prevent data loss in a laboratory. The...
Question 4: Which of the following BEST describes the MFA attribute that...
Question 5: The IT department's on-site developer has been with the team...
Question 6: Which of the following scenarios would make a DNS sinkhole e...
Question 7: A company has drafted an insider-threat policy that prohibit...
Question 8: The following is an administrative control that would be MOS...
Question 9: An organization routes all of its traffic through a VPN Most...
Question 10: A security analyst is looking for a solution to help communi...
Question 11: Several employees return to work the day after attending an ...
Question 12: A security analyst is investigating a vulnerability in which...
Question 13: An attacker was easily able to log in to a company's securit...
Question 14: An engineer is setting up a VDI environment for a factory lo...
Question 15: A cybersecurity analyst needs to implement secure authentica...
Question 16: An end user reports a computer has been acting slower than n...
Question 17: Which of the following is MOST likely to contain ranked and ...
Question 18: A database administrator needs to ensure all passwords are s...
Question 19: In which of the following common use cases would steganograp...
Question 20: An organization is concerned that its hosted web servers are...
Question 21: A small company that does not have security staff wants to i...
Question 22: Which of the following allows for functional test data to be...
Question 23: Which of the following would MOST likely support the integri...
Question 24: A security analyst has been asked to investigate a situation...
Question 25: A security administrator is analyzing the corporate wireless...
Question 26: A company recently added a DR site and is redesigning the ne...
Question 27: n organization plans to transition the intrusion detection a...
Question 28: Which of the following would be BEST to establish between or...
Question 29: A technician needs to prevent data loss in a laboratory. The...
Question 30: A company's help desk received several AV alerts indicating ...
Question 31: A network engineer needs to create a plan for upgrading the ...
Question 32: An organization that is located in a flood zone is MOST like...
Question 33: A user contacts the help desk to report the following: * Two...
Question 34: A customer called a company's security team to report that a...
Question 35: An organization is concerned that is hosted web servers are ...
Question 36: A security analyst has been reading about a newly discovered...
Question 37: A cybersecurity analyst reviews the log files from a web ser...
Question 38: An organization wants to implement a third factor to an exis...
Question 39: A company recently experienced a data breach and the source ...
Question 40: After reading a security bulletin, a network security manage...
Question 41: Which of the following is MOST likely to outline the roles a...
Question 42: When used at the design stage, which of the following improv...
Question 43: A security engineer needs to implement an MDM solution that ...
Question 44: A network manager is concerned that business may be negative...
Question 45: Which of the following refers to applications and systems th...
Question 46: Which of the following would be the BEST resource lor a soft...
Question 47: A security engineer is installing a WAF to protect the compa...
Question 48: An organization just experienced a major cyberattack modem. ...
Question 49: A RAT that was used to compromise an organization's banking ...
Question 50: When selecting a technical solution for identity management,...
Question 51: A global company is experiencing unauthorized logging due to...
Question 52: A network administrator needs to build out a new datacenter,...
Question 53: Users have been issued smart cards that provide physical acc...
Question 54: A systems administrator needs to install a new wireless netw...
Question 55: A university with remote campuses, which all use different s...
Question 56: A security analyst is performing a forensic investigation co...
Question 57: Entering a secure area requires passing through two doors, b...
Question 58: An end user reports a computer has been acting slower than n...
Question 59: After entering a username and password, and administrator mu...
Question 60: A company is launching a new internet platform for its clien...
Question 61: Which of the following ISO standards is certified for privac...
Question 62: A security analyst needs to be proactive in understand the t...
Question 63: Company engineers regularly participate in a public Internet...
Question 64: During an incident response, a security analyst observes the...
Question 65: A nationwide company is experiencing unauthorized logins at ...
Question 66: In which of the following risk management strategies would c...
Question 67: While reviewing the wireless router, the systems administrat...
Question 68: A well-known organization has been experiencing attacks from...
Question 69: An analyst visits an internet forum looking for information ...
Question 70: An attacker is attempting, to harvest user credentials on a ...
Question 71: Which of the following types of controls is a CCTV camera th...
Question 72: A manufacturer creates designs for very high security produc...
Question 73: Which of the following utilize a subset of real data and are...
Question 74: A multinational organization that offers web-based services ...
Question 75: A network administrator at a large organization Is reviewing...
Question 76: A critical file server is being upgraded and the systems adm...
Question 77: Joe, a user at a company, clicked an email link led to a web...
Question 78: A systems analyst is responsible for generating a new digita...
Question 79: The manager who is responsible for a data set has asked a se...
Question 80: A security analyst is reviewing the following command-line o...
Question 81: An organization has been experiencing outages during holiday...
Question 82: A security analyst is running a vulnerability scan to check ...
Question 83: An engineer wants to access sensitive data from a corporate-...
Question 84: An organization has a growing workforce that is mostly drive...
Question 85: A document that appears to be malicious has been discovered ...
Question 86: An.. that has a large number of mobile devices is exploring ...
Question 87: Which of the following would BEST identify and remediate a d...
Question 88: A company's Chief Information Security Officer (CISO) recent...
Question 89: A security analyst receives a SIEM alert that someone logged...
Question 90: A smart retail business has a local store and a newly establ...
Question 91: Which of the following incident response steps involves acti...
Question 92: An employee has been charged with fraud and is suspected of ...
Question 93: A cybersecurity department purchased o new PAM solution. The...
Question 94: A Chief Security Officer (CSO) is concerned about the volume...
Question 95: The Chief Security Officer (CSO) at a major hospital wants t...
Question 96: An organization has expanded its operations by opening a rem...
Question 97: Which of the following would cause a Chief Information Secur...
Question 98: A company provides mobile devices to its users to permit acc...
Question 99: A user enters a password to log in to a workstation and is t...
Question 100: Which of the following will MOST likely adversely impact the...
Question 101: A network engineer is troubleshooting wireless network conne...
Question 102: An organization hired a consultant to assist with an active ...
Question 103: A security architect at a large, multinational organization ...
Question 104: A security operations analyst is using the company's SIEM so...
Question 105: A software developer needs to perform code-execution testing...
Question 106: Which of the following policies would help an organization i...
Question 107: A security administrator checks the table of a network switc...
Question 108: A SOC is implementing an in sider-threat-detection program. ...
Question 109: A company has been experiencing very brief power outages fro...
Question 110: A small business office is setting up a wireless infrastruct...
Question 111: An auditor is performing an assessment of a security applian...
Question 112: A recently discovered zero-day exploit utilizes an unknown v...
Question 113: A security analyst is investigation an incident that was fir...
Question 114: The cost of 'movable media and the security risks of transpo...
Question 115: The spread of misinformation surrounding the outbreak of a n...
Question 116: A security analyst Is hardening a Linux workstation and must...
Question 117: Which of the following types of controls is a turnstile?...
Question 118: A SOC is implementing an in sider-threat-detection program. ...
Question 119: A small business just recovered from a ransomware attack aga...
Question 120: A security analyst needs to generate a server certificate to...
Question 121: A startup company is using multiple SaaS and IaaS platforms ...
Question 122: A company is designing the layout of a new datacenter so it ...
Question 123: Some laptops recently went missing from a locked storage are...
Question 124: A company is upgrading its wireless infrastructure to WPA2-E...
Question 125: Which of the following is the purpose of a risk register?...
Question 126: Which of the following BEST explains the difference between ...
Question 127: A security administrator has noticed unusual activity occurr...
Question 128: A recent audit uncovered a key finding regarding the use of ...
1 commentQuestion 129: A bank detects fraudulent activity on user's account. The us...
Question 130: A security analyst is reviewing the following output from a ...
Question 131: A vulnerability assessment report will include the CVSS scor...
Question 132: An analyst is trying to identify insecure services that are ...