<< Prev Question Next Question >>

Question 92/139

An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (139q)
Question 1: An organization wants to implement a third factor to an exis...
Question 2: A network administrator has been asked to install an IDS to ...
Question 3: A500 is implementing an insider threat detection program, Th...
Question 4: A company just developed a new web application for a governm...
Question 5: While reviewing the wireless router, the systems administrat...
Question 6: A security analyst has been asked to investigate a situation...
Question 7: A forensics investigator is examining a number of unauthoriz...
Question 8: Which of the following describes the BEST approach for deplo...
Question 9: An organization has hired a security analyst to perform a pe...
Question 10: An organization has implemented a policy requiring the use o...
Question 11: A company wants to deploy PKI on its Internet-facing website...
Question 12: The website http://companywebsite.com requires users to prov...
Question 13: A security analyst is reviewing the following attack log out...
Question 14: A company is required to continue using legacy software to s...
Question 15: The new Chief Executive Officer (CEO) of a large company has...
Question 16: A major political party experienced a server breach. The hac...
Question 17: A user reports constant lag and performance issues with the ...
Question 18: A network administrator at a large organization Is reviewing...
Question 19: Which of the following would be BEST to establish between or...
Question 20: A RAT that was used to compromise an organization's banking ...
Question 21: A symmetric encryption algorithm Is BEST suited for:...
Question 22: Which of the following would be the BEST resource lor a soft...
Question 23: An attacked is attempting to exploit users by creating a fak...
Question 24: An employee has been charged with fraud and is suspected of ...
Question 25: A security administrator is setting up a SIEM to help monito...
Question 26: A technician needs to prevent data loss in a laboratory. The...
Question 27: A financial analyst is expecting an email containing sensiti...
Question 28: A recent security assessment revealed that an actor exploite...
Question 29: Which of the following technical controls is BEST suited for...
Question 30: An analyst needs to set up a method for securely transferrin...
Question 31: An attacker is trying to gain access by installing malware o...
Question 32: A security analyst is reviewing a new website that will soon...
Question 33: A security administrator currently spends a large amount of ...
Question 34: Which of the following will MOST likely cause machine learni...
Question 35: Which of the following should be put in place when negotiati...
Question 36: Which of the following BEST describes a security exploit for...
Question 37: Accompany deployed a WiFi access point in a public area and ...
Question 38: Several large orders of merchandise were recently purchased ...
Question 39: An engineer is setting up a VDI environment for a factory lo...
Question 40: An organization is concerned that its hosted web servers are...
Question 41: A company recently experienced a data breach and the source ...
Question 42: A network administrator needs to build out a new datacenter,...
Question 43: A company wants to modify its current backup strategy to min...
Question 44: A cybersecurity manager has scheduled biannual meetings with...
Question 45: A company is upgrading its wireless infrastructure to WPA2-E...
Question 46: An organization's corporate offices were destroyed due to a ...
Question 47: A user contacts the help desk to report the following: Two d...
Question 48: A security analyst is investigation an incident that was fir...
Question 49: The spread of misinformation surrounding the outbreak of a n...
Question 50: A security administrator is analyzing the corporate wireless...
Question 51: Local guidelines require that all information systems meet a...
Question 52: A security analyst receives the configuration of a current V...
Question 53: Which of the following are requirements that must be configu...
Question 54: A global pandemic is forcing a private organization to close...
Question 55: Which of the following is the purpose of a risk register?...
Question 56: A security analyst must determine if either SSH or Telnet is...
Question 57: A Chief Security Office's (CSO's) key priorities are to impr...
Question 58: A security analyst sees the following log output while revie...
Question 59: An attacker was easily able to log in to a company's securit...
Question 60: Which of the following cloud models provides clients with se...
Question 61: Which of the following is the MOST secure but LEAST expensiv...
Question 62: A network administrator is concerned about users being expos...
Question 63: A security engineer needs to implement an MDM solution that ...
Question 64: Which of the following BEST describes a social-engineering a...
Question 65: Which of the following cryptographic concepts would a securi...
Question 66: A security analyst is preparing a threat for an upcoming int...
Question 67: A security analyst is running a vulnerability scan to check ...
Question 68: The Chief Financial Officer (CFO) of an insurance company re...
Question 69: A company just implemented a new telework policy that allows...
Question 70: Which of the following provides the BEST protection for sens...
Question 71: An organization routes all of its traffic through a VPN Most...
Question 72: Which of the following often operates in a client-server arc...
Question 73: A public relations team will be taking a group of guest on a...
Question 74: A systems administrator needs to install the same X.509 cert...
Question 75: An organization is developing an authentication service for ...
Question 76: An end user reports a computer has been acting slower than n...
Question 77: A user recent an SMS on a mobile phone that asked for bank d...
Question 78: A customer called a company's security team to report that a...
Question 79: A network engineer is troubleshooting wireless network conne...
Question 80: The human resources department of a large online retailer ha...
Question 81: organization's vulnerabilities. Which of the following would...
Question 82: An organization is developing a plan in the event of a compl...
Question 83: A company's help desk received several AV alerts indicating ...
Question 84: Which of the following would MOST likely support the integri...
Question 85: The facilities supervisor for a government agency is concern...
Question 86: Which of the following is MOST likely to contain ranked and ...
Question 87: A network engineer notices the VPN concentrator overloaded a...
Question 88: The concept of connecting a user account across the systems ...
Question 89: An.. that has a large number of mobile devices is exploring ...
Question 90: To secure an application after a large data breach, an e-com...
Question 91: A nationwide company is experiencing unauthorized logins at ...
Question 92: An organization is concerned that is hosted web servers are ...
Question 93: A security an alyst needs to implement security features acr...
Question 94: Which of the following types of controls is a turnstile?...
Question 95: An engineer wants to access sensitive data from a corporate-...
Question 96: Which of the following organizational policies are MOST like...
Question 97: A SECURITY ANALYST NEEDS TO FIND REAL-TIME DATA ON THE LATES...
Question 98: Employees are having issues accessing the company's website....
Question 99: A security modern may have occurred on the desktop PC of an ...
Question 100: Which of the following scenarios BEST describes a risk reduc...
Question 101: A security analyst is performing a packet capture on a serie...
Question 102: Entering a secure area requires passing through two doors, b...
Question 103: The following is an administrative control that would be MOS...
Question 104: A systems analyst is responsible for generating a new digita...
Question 105: Which of the following BEST explains the difference between ...
Question 106: A company has determined that if its computer-based manufact...
Question 107: Following a prolonged datacenter outage that affected web-ba...
Question 108: A company uses specially configured workstations tor any wor...
Question 109: A company has drafted an insider-threat policy that prohibit...
Question 110: A network manager is concerned that business may be negative...
Question 111: When implementing automation with loT devices, which of the ...
Question 112: A Chief Security Officer (CSO) is concerned about the volume...
Question 113: During a security assessment, a security finds a file with o...
Question 114: A manufacturer creates designs for very high security produc...
Question 115: A security analyst needs to be proactive in understand the t...
Question 116: Which of the following should a data owner require all perso...
Question 117: Which of the following will provide the BEST physical securi...
Question 118: A privileged user at a company stole several proprietary doc...
Question 119: A security analyst receives a SIEM alert that someone logged...
Question 120: The Chief Security Officer (CSO) at a major hospital wants t...
Question 121: Joe, an employee, receives an email stating he won the lotte...
Question 122: A security analyst needs to determine how an attacker was ab...
Question 123: A development team employs a practice of bringing all the co...
Question 124: A small business office is setting up a wireless infrastruct...
Question 125: An attacker was easily able to log in to a company's securit...
Question 126: An attacker is attempting to exploit users by creating a fak...
Question 127: A security manager for a retailer needs to reduce the scope ...
Question 128: A security analyst is investigating multiple hosts that are ...
Question 129: A security administrator suspects there may be unnecessary s...
Question 130: Which of the following BEST describes the MFA attribute that...
Question 131: An attacker is exploiting a vulnerability that does not have...
Question 132: A consultant is configuring a vulnerability scanner for a la...
Question 133: A large financial services firm recently released informatio...
Question 134: A small business just recovered from a ransomware attack aga...
Question 135: A security engineer needs to enhance MFA access to sensitive...
Question 136: The following are the logs of a successful attack. (Exhibit)...
Question 137: Which of the following policies would help an organization i...
Question 138: A security analyst is configuring a large number of new comp...
Question 139: A pharmaceutical sales representative logs on to a laptop an...