Next Question >>

Question 1/82

A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (82q)
Question 1: A company's end users are reporting that they are unable to ...
Question 2: After a recent vulnerability scan, a security engineer needs...
Question 3: Which of the following describes the maximum allowance of ac...
Question 4: A company is expanding its threat surface program and allowi...
Question 5: A security engineer is implementing FDE for all laptops in a...
Question 6: Which of the following automation use cases would best enhan...
Question 7: Which of the following incident response activities ensures ...
Question 8: An administrator finds that all user workstations and server...
Question 9: A security analyst reviews domain activity logs and notices ...
Question 10: Which of the following methods to secure credit card data is...
Question 11: A security practitioner completes a vulnerability assessment...
Question 12: Which of the following factors are the most important to add...
Question 13: During the onboarding process, an employee needs to create a...
Question 14: Which of the following is used to validate a certificate whe...
Question 15: A security administrator would like to protect data on emplo...
Question 16: Which of the following should a security administrator adher...
Question 17: The local administrator account for a company's VPN applianc...
Question 18: A company purchased cyber insurance to address items listed ...
Question 19: A security analyst is reviewing alerts in the SIEM related t...
Question 20: A systems administrator is working on a solution with the fo...
Question 21: A Chief Information Security Officer (CISO) wants to explici...
Question 22: A client demands at least 99.99% uptime from a service provi...
Question 23: An analyst is evaluating the implementation of Zero Trust pr...
Question 24: Which of the following roles, according to the shared respon...
Question 25: Which of the following has been implemented when a host-base...
Question 26: Which of the following describes a security alerting and mon...
Question 27: A cyber operations team informs a security analyst about a n...
Question 28: A company's marketing department collects, modifies, and sto...
Question 29: An organization would like to store customer data on a separ...
Question 30: A penetration tester begins an engagement by performing port...
Question 31: A Chief Information Security Officer wants to monitor the co...
Question 32: One of a company's vendors sent an analyst a security bullet...
Question 33: A bank insists all of its vendors must prevent data loss on ...
Question 34: A technician needs to apply a high-priority patch to a produ...
Question 35: After a recent ransomware attack on a company's system, an a...
Question 36: A company's legal department drafted sensitive documents in ...
Question 37: A network manager wants to protect the company's VPN by impl...
Question 38: Which of the following is required for an organization to pr...
Question 39: Which of the following would help ensure a security analyst ...
Question 40: A systems administrator is looking for a low-cost applicatio...
Question 41: A newly identified network access vulnerability has been fou...
Question 42: During a security incident, the security operations team ide...
Question 43: Which of the following tools can assist with detecting an em...
Question 44: Employees in the research and development business unit rece...
Question 45: A company is adding a clause to its AUP that states employee...
Question 46: An organization recently updated its security policy to incl...
Question 47: An engineer needs to find a solution that creates an added l...
Question 48: A company is developing a critical system for the government...
Question 49: A company is required to use certified hardware when buildin...
Question 50: An organization is building a new backup data center with co...
Question 51: Which of the following would be best suited for constantly c...
Question 52: Which of the following is the best way to consistently deter...
Question 53: After reviewing the following vulnerability scanning report:...
Question 54: Which of the following security concepts is the best reason ...
Question 55: An administrator assists the legal and compliance team with ...
Question 56: A company's web filter is configured to scan the URL for str...
Question 57: A company hired a consultant to perform an offensive securit...
Question 58: A company is planning a disaster recovery site and needs to ...
Question 59: Users at a company are reporting they are unable to access t...
Question 60: An organization is leveraging a VPN between its headquarters...
Question 61: Several employees received a fraudulent text message from so...
Question 62: A company is concerned about weather events causing damage t...
Question 63: A security operations center determines that the malicious a...
Question 64: Which of the following describes the reason root cause analy...
Question 65: Which of the following would be the best way to block unknow...
Question 66: A company is planning to set up a SIEM system and assign an ...
Question 67: Which of the following involves an attempt to take advantage...
Question 68: A healthcare organization wants to provide a web application...
Question 69: A data administrator is configuring authentication for a Saa...
Question 70: An enterprise is trying to limit outbound DNS traffic origin...
Question 71: A company requires hard drives to be securely wiped before s...
Question 72: In order to strengthen a password and prevent a hacker from ...
Question 73: Security controls in a data center are being reviewed to ens...
Question 74: A user is attempting to patch a critical system, but the pat...
Question 75: A company is planning to set up a SIEM system and assign an ...
Question 76: After an audit, an administrator discovers all users have ac...
Question 77: An employee clicked a link in an email from a payment websit...
Question 78: Which of the following scenarios describes a possible busine...
Question 79: A company is working with a vendor to perform a penetration ...
Question 80: Which of the following can best protect against an employee ...
Question 81: Which of the following exercises should an organization use ...
Question 82: A systems administrator wants to prevent users from being ab...