<< Prev Question Next Question >>

Question 83/111

A technician is analyzing output from a popular network mapping tool for a PCI audit:

Which of the following best describes the output?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (111q)
Question 1: An employee is no longer able to log in to an account after ...
Question 2: A company has a primary control in place to restrict access ...
Question 3: When investigating a potentially compromised host, an analys...
Question 4: An end-of-life date was announced for a widely used OS. A bu...
Question 5: An employee is suspected of misusing a company-issued laptop...
Question 6: A security analyst is reviewing a packet capture in Wireshar...
Question 7: Which of the following describes how a CSIRT lead determines...
Question 8: A disgruntled open-source developer has decided to sabotage ...
Question 9: Which of the following tools would work best to prevent the ...
Question 10: Which of the following would help an analyst to quickly find...
Question 11: An organization conducted a web application vulnerability as...
Question 12: A security analyst is trying to detect connections to a susp...
Question 13: Which of the following is an important aspect that should be...
Question 14: A cybersecurity team lead is developing metrics to present i...
Question 15: A security analyst has found the following suspicious DNS tr...
Question 16: A cybersecurity analyst has recovered a recently compromised...
Question 17: An analyst notices there is an internal device sending HTTPS...
Question 18: A cloud team received an alert that unauthorized resources w...
Question 19: An organization has activated the CSIRT. A security analyst ...
Question 20: An organization discovered a data breach that resulted in Pl...
Question 21: An analyst wants to ensure that users only leverage web-base...
Question 22: A security analyst recently joined the team and is trying to...
Question 23: An organization was compromised, and the usernames and passw...
Question 24: A recent zero-day vulnerability is being actively exploited,...
Question 25: Following a recent security incident, the Chief Information ...
Question 26: A cryptocurrency service company is primarily concerned with...
Question 27: A security analyst is trying to identify anomalies on the ne...
Question 28: An employee downloads a freeware program to change the deskt...
Question 29: During security scanning, a security analyst regularly finds...
Question 30: Which of the following entities should an incident manager w...
Question 31: The Chief Executive Officer of an organization recently hear...
Question 32: Which of the following best describes the goal of a tabletop...
Question 33: An older CVE with a vulnerability score of 7.1 was elevated ...
Question 34: An analyst is remediating items associated with a recent inc...
Question 35: Following an incident, a security analyst needs to create a ...
Question 36: Which of the following is a reason why proper handling and r...
Question 37: An organization would like to ensure its cloud infrastructur...
Question 38: The security operations team is required to consolidate seve...
Question 39: A Chief Information Security Officer has outlined several re...
Question 40: A security analyst detected the following suspicious activit...
Question 41: After conducting a cybersecurity risk assessment for a new s...
Question 42: Which of the following can be used to learn more about TTPs ...
Question 43: Which of the following best describes the goal of a disaster...
Question 44: A security analyst identified the following suspicious entry...
Question 45: An organization has tracked several incidents that are liste...
Question 46: A systems analyst is limiting user access to system configur...
Question 47: A security manager is looking at a third-party vulnerability...
Question 48: Which of the following is a benefit of the Diamond Model of ...
Question 49: After completing a review of network activity. the threat hu...
Question 50: A Chief Information Security Officer (CISO) is concerned tha...
Question 51: A security analyst is performing an investigation involving ...
Question 52: When starting an investigation, which of the following must ...
Question 53: A security analyst is writing a shell script to identify IP ...
Question 54: A vulnerability scan of a web server that is exposed to the ...
Question 55: A security analyst recently used Arachni to perform a vulner...
Question 56: A small company does no! have enough staff to effectively se...
Question 57: A company has the following security requirements: . No publ...
Question 58: An analyst receives threat intelligence regarding potential ...
Question 59: A managed security service provider is having difficulty ret...
Question 60: A SIEM alert is triggered based on execution of a suspicious...
Question 61: A payroll department employee was the target of a phishing a...
Question 62: You are a cybersecurity analyst tasked with interpreting sca...
Question 63: A company is concerned with finding sensitive file storage l...
Question 64: Which of the following is the first step that should be perf...
Question 65: During the log analysis phase, the following suspicious comm...
Question 66: Which of the following will most likely ensure that mission-...
Question 67: During an incident involving phishing, a security analyst ne...
Question 68: Which of the following should be updated after a lessons-lea...
Question 69: A security program was able to achieve a 30% improvement in ...
Question 70: A vulnerability analyst received a list of system vulnerabil...
Question 71: A SOC analyst recommends adding a layer of defense for all e...
Question 72: During an incident, analysts need to rapidly investigate by ...
Question 73: A security team is concerned about recent Layer 4 DDoS attac...
Question 74: An analyst recommends that an EDR agent collect the source I...
Question 75: An analyst is examining events in multiple systems but is ha...
Question 76: Which of the following is a nation-state actor least likely ...
Question 77: A user downloads software that contains malware onto a compu...
Question 78: Which of the following does "federation" most likely refer t...
Question 79: Which of the following would help to minimize human engageme...
Question 80: While performing a dynamic analysis of a malicious file, a s...
Question 81: A SOC manager receives a phone call from an upset customer. ...
Question 82: Which of the following is a useful tool for mapping, trackin...
Question 83: A technician is analyzing output from a popular network mapp...
Question 84: Which of the following is the most important factor to ensur...
Question 85: During a recent site survey. an analyst discovered a rogue w...
Question 86: A security analyst is working on a server patch management p...
Question 87: A company recently removed administrator rights from all of ...
Question 88: During an internal code review, software called "ACE" was di...
Question 89: A security team identified several rogue Wi-Fi access points...
Question 90: Which of the following best describes the process of requiri...
Question 91: A cybersecurity analyst notices unusual network scanning act...
Question 92: A cybersecurity analyst is reviewing SIEM logs and observes ...
Question 93: Security analysts review logs on multiple servers on a daily...
Question 94: An analyst needs to provide recommendations based on a recen...
Question 95: An incident response analyst notices multiple emails travers...
Question 96: Given the following CVSS string- CVSS:3.0/AV:N/AC:L/PR:N/UI:...
Question 97: After updating the email client to the latest patch, only ab...
Question 98: A security analyst detects an email server that had been com...
Question 99: Approximately 100 employees at your company have received a ...
Question 100: A security analyst performs a vulnerability scan. Based on t...
Question 101: A zero-day command injection vulnerability was published. A ...
Question 102: A systems administrator receives reports of an internet-acce...
Question 103: A technician identifies a vulnerability on a server and appl...
Question 104: A cybersecurity team has witnessed numerous vulnerability ev...
Question 105: An analyst is conducting monitoring against an authorized te...
Question 106: An incident response team found IoCs in a critical server. T...
Question 107: The Chief Information Security Officer wants to eliminate an...
Question 108: The security team reviews a web server for XSS and runs the ...
Question 109: An analyst finds that an IP address outside of the company n...
Question 110: Which of the following best describes the importance of impl...
Question 111: Which of the following is the best metric for an organizatio...