<< Prev Question Next Question >>

Question 54/148

An analyst wants to identify hosts that are connecting to the external FTP servers and what, if any, passwords are being used. Which of the following commands should the analyst use?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (148q)
Question 1: Which of the following technologies can be used to store dig...
Question 2: A remote code-execution vulnerability was discovered in the ...
Question 3: An analyst is participating in the solution analysis process...
Question 4: A cybersecurity analyst is supposing an incident response ef...
Question 5: A security analyst is investigating a system compromise. The...
Question 6: A security analyst received a SIEM alert regarding high leve...
Question 7: For machine learning to be applied effectively toward securi...
Question 8: An analyst is reviewing a list of vulnerabilities, which wer...
Question 9: A cybersecurity analyst is responding to an incident. The co...
Question 10: A security analyst identified one server that was compromise...
Question 11: As part of an exercise set up by the information security of...
Question 12: A security analyst suspects a malware infection was caused b...
Question 13: Which of the following sets of attributes BEST illustrates t...
Question 14: A cybersecurity analyst is establishing a threat hunting and...
Question 15: A company's modem response team is handling a threat that wa...
Question 16: An organization is moving its infrastructure to the cloud in...
Question 17: A company stores all of its data in the cloud. All company-o...
Question 18: Which of the following technologies can be used to house the...
Question 19: A company recently experienced a break-in whereby a number o...
Question 20: Ransomware is identified on a company's network that affects...
Question 21: A security analyst is reviewing a suspected phishing campaig...
Question 22: A security analyst reviews the following aggregated output f...
Question 23: A security manager has asked an analyst to provide feedback ...
Question 24: D18912E1457D5D1DDCBD40AB3BF70D5D A security analyst scanned ...
Question 25: An organization developed a comprehensive modern response po...
Question 26: An analyst has been asked to provide feedback regarding the ...
Question 27: Given the Nmap request below: (Exhibit) Which of the followi...
Question 28: A developer wrote a script to make names and other Pll data ...
Question 29: A company's senior human resources administrator left for an...
Question 30: A security analyst has received reports of very slow, interm...
Question 31: Joe, a penetration tester, used a professional directory to ...
Question 32: A small organization has proprietary software that is used i...
Question 33: An analyst is reviewing the following code output of a vulne...
Question 34: A company wants to establish a threat-hunting team. Which of...
Question 35: Which of the following sources will provide the MOST relevan...
Question 36: Which of the following organizational initiatives would be M...
Question 37: A security analyst is providing a risk assessment for a medi...
Question 38: While planning segmentation for an ICS environment, a securi...
Question 39: Which of the following are components of the intelligence cy...
Question 40: An employee in the billing department accidentally sent a sp...
Question 41: An organization is experiencing issues with emails that are ...
Question 42: A company's blocklist has outgrown the current technologies ...
Question 43: A security analyst inspects the header of an email that is p...
Question 44: A development team is testing a new application release. The...
Question 45: A financial organization has offices located globally. Per t...
Question 46: A team of security analysts has been alerted to potential ma...
Question 47: A security analyst is responding to an incident on a web ser...
Question 48: Understanding attack vectors and integrating intelligence so...
Question 49: A user reports the system is behaving oddly following the in...
Question 50: An organization has been seeing increased levels of maliciou...
Question 51: A security analyst has discovered malware is spreading acros...
Question 52: Which of the following describes the mam difference between ...
Question 53: A security analyst wants to identify which vulnerabilities a...
Question 54: An analyst wants to identify hosts that are connecting to th...
Question 55: A security analyst needs to identify possible threats to a c...
Question 56: Ann, a user, reports to the security team that her browser b...
Question 57: A security analyst has a sample of malicious software and ne...
Question 58: During an investigation, an incident responder intends to re...
Question 59: An organization's network administrator uncovered a rogue de...
Question 60: Clients are unable to access a company's API to obtain prici...
Question 61: In system hardening, which of the following types of vulnera...
Question 62: As part of a review of modern response plans, which of the f...
Question 63: A security analyst is conducting a post-incident log analysi...
Question 64: Following a recent security breach, a company decides to inv...
Question 65: A finance department employee has received a message that ap...
Question 66: A cybersecurity analyst needs to rearchitect the network usi...
Question 67: An organization was alerted to a possible compromise after i...
Question 68: A cybersecurity analyst is supporting an incident response e...
Question 69: An organization suspects it has had a breach, and it is tryi...
Question 70: A small business does not have enough staff in the accountin...
Question 71: A hybrid control is one that:
Question 72: As part of an Intelligence feed, a security analyst receives...
Question 73: A security analyst is scanning the network to determine if a...
Question 74: The Chief information Officer of a large cloud software vend...
Question 75: An analyst is searching a log for potential credit card leak...
Question 76: Employees of a large financial company are continuously bein...
Question 77: A security analyst is attempting to utilize the blowing thre...
Question 78: A company's Chief Information Security Officer (CISO) is con...
Question 79: A security analyst is investigating malicious traffic from a...
Question 80: A remote code execution vulnerability was discovered in the ...
Question 81: During an investigation, an analyst discovers the following ...
Question 82: Data spillage occurred when an employee accidentally emailed...
Question 83: industry partners from critical infrastructure organizations...
Question 84: An audit has revealed an organization is utilizing a large n...
Question 85: A software development team asked a security analyst to revi...
Question 86: A user receives a potentially malicious email that contains ...
Question 87: An organization is upgrading its network and all of its work...
Question 88: A company's marketing emails are either being found in a spa...
Question 89: A security analyst reviews the latest reports from the compa...
Question 90: A company is experiencing a malware attack within its networ...
Question 91: A security analyst discovered a specific series of IP addres...
Question 92: A routine vulnerability scan detected a known vulnerability ...
Question 93: An organization that handles sensitive financial information...
Question 94: A company's change management team has asked a security anal...
Question 95: A security analyst for a large pharmaceutical company was gi...
Question 96: The SFTP server logs show thousands of failed login attempts...
Question 97: When attempting to do a stealth scan against a system that d...
Question 98: Which of the following roles is ultimately responsible for d...
Question 99: After a remote command execution incident occurred on a web ...
Question 100: An information security analyst observes anomalous behavior ...
Question 101: A large amount of confidential data was leaked during a rece...
Question 102: An organization recently discovered that spreadsheet files c...
Question 103: Which of the following will allow different cloud instances ...
Question 104: Approximately 100 employees at your company have received a ...
Question 105: A compliance officer of a large organization has reviewed th...
Question 106: The SOC has received reports of slowness across all workstat...
Question 107: A small electronics company decides to use a contractor to a...
Question 108: An information security analyst is working with a data owner...
Question 109: A security analyst is conceded that a third-party applicatio...
Question 110: An analyst needs to provide a recommendation that will allow...
Question 111: A cybersecurity analyst is investigating a potential inciden...
Question 112: A security analyst is running a tool against an executable o...
Question 113: A company recently experienced multiple DNS DDoS attacks, an...
Question 114: A security analyst is performing a Diamond Model analysis of...
Question 115: As part of a review of incident response plans, which of the...
Question 116: A security analyst gathered forensics from a recent intrusio...
Question 117: An analyst is working with a network engineer to resolve a v...
Question 118: A newly appointed Chief Information Security Officer (CISO) ...
Question 119: A system's authority to operate (ATO) is set to expire in fo...
Question 120: A security analyst is generating a list of recommendations f...
Question 121: An analyst needs to provide recommendations for the AUP Whic...
Question 122: When reviewing a compromised authentication server, a securi...
Question 123: A system is experiencing noticeably slow response times, and...
Question 124: A team of security analysis has been alerted to potential ma...
Question 125: While reviewing a cyber-risk assessment, an analyst notes th...
Question 126: Which of the following attacks can be prevented by using out...
Question 127: An information security analyst is reviewing backup data set...
Question 128: During routine monitoring, a security analyst discovers seve...
Question 129: An organisation is assessing risks so it can prioritize its ...
Question 130: A product manager is working with an analyst to design a new...
Question 131: A security team is implementing a new vulnerability manageme...
Question 132: Which of the following incident response components can iden...
Question 133: An analyst performs a routine scan of a host using Nmap and ...
Question 134: A security architect is reviewing the options for performing...
Question 135: An organization that uses SPF has been notified emails sent ...
Question 136: While analyzing logs from a WAF, a cybersecurity analyst fin...
Question 137: Portions of a legacy application are being refactored to dis...
Question 138: While reviewing log files, a security analyst uncovers a bru...
Question 139: The inability to do remote updates of certificates. keys sof...
Question 140: Bootloader malware was recently discovered on several compan...
Question 141: A security analyst recently used Arachni to perform a vulner...
Question 142: Which of me following are reasons why consumer IoT devices s...
Question 143: A security analyst is building a malware analysis lab. The a...
Question 144: Which of the following BEST describes the primary role ol a ...
Question 145: A Chief Executive Officer (CEO) is concerned about the compa...
Question 146: The computer incident response team at a multinational compa...
Question 147: Which of the following sources would a security analyst rely...
Question 148: A company's data is still being exfiltered to business compe...