<< Prev Question Next Question >>

Question 18/96

A UNIX workstation has been compromised. The security analyst discovers high CPU usage during off- hours on the workstation. Which of the following UNIX programs can be used to detect the rogue process?
(Choose two.)

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (96q)
Question 1: From a compromised system, an attacker bypasses a proxy serv...
Question 2: Which of the following is the reason that out-of-band commun...
Question 3: A SOC analyst reviews vendor security bulletins and security...
Question 4: A security analyst would like to parse through several SQL l...
Question 5: Which of the following are legally compliant forensics appli...
Question 6: An administrator wants to block Java exploits that were not ...
Question 7: An organization's firewall has recently been bombarded with ...
Question 8: A malicious actor sends a crafted email to the office manage...
Question 9: A system administrator needs to analyze a PCAP file on a Lin...
Question 10: A hacker's end goal is to target the Chief Financial Officer...
Question 11: An attacker has decided to attempt a brute force attack on a...
Question 12: Click the exhibit button. Which of the following Windows too...
Question 13: A suspicious laptop is found in a datacenter. The laptop is ...
Question 14: A user reports a pop-up error when starting a Windows machin...
Question 15: While a network administrator is monitoring the company netw...
Question 16: A security analyst for a financial services firm is monitori...
Question 17: Which of the following tools can be used to identify open po...
Question 18: A UNIX workstation has been compromised. The security analys...
Question 19: An outside organization has reported to the Chief Informatio...
Question 20: During an annual penetration test, several rootkit-enabled s...
Question 21: Which of the following can hackers use to gain access to a s...
Question 22: A high-level government official uses anonymous bank account...
Question 23: A system administrator is informed that a user received an e...
Question 24: A malicious attacker has compromised a database by implement...
Question 25: DRAG DROP Drag and drop the following steps to perform a suc...
Question 26: An incident responder is investigating a Linux server report...
Question 27: When investigating a wireless attack, which of the following...
Question 28: The Chief Information Officer (CIO) of a company asks the in...
Question 29: An organization performs regular updates to its network devi...
Question 30: (Exhibit) The above Linux command is used to search for:...
Question 31: During an investigation on Windows 10 system, a system admin...
Question 32: Which of the following is an automated password cracking tec...
Question 33: Which of the following commands should be used to print out ...
Question 34: An incident responder notices many entries in an apache acce...
Question 35: An incident responder suspects that a host behind a firewall...
Question 36: An intruder gains physical access to a company's headquarter...
Question 37: While reviewing some audit logs, an analyst has identified c...
Question 38: Which of the following resources BEST supports malware analy...
Question 39: A forensics analyst is analyzing an executable and thinks it...
Question 40: DRAG DROP When perpetrating an attack, there are often a num...
Question 41: A security analyst discovers a zero-day vulnerability affect...
Question 42: A security professional has been tasked with the protection ...
Question 43: A computer attacker has compromised a system by implanting a...
Question 44: Malicious code that can replicate itself using various techn...
Question 45: A Windows system user reports seeing a command prompt window...
Question 46: An alert has been triggered identifying a new application ru...
Question 47: An alert on user account activity outside of normal business...
Question 48: A security auditor has been asked to analyze event logs to l...
Question 49: Which of the following protocols can be used for data extens...
Question 50: During a network-based attack, which of the following data s...
Question 51: A zero-day vulnerability is discovered on a company's networ...
Question 52: A company website was hacked via the SQL query below: (Exhib...
Question 53: When determining the threats/vulnerabilities to migrate, it ...
Question 54: Which of the following could an attacker use to perpetrate a...
Question 55: Which of the following describes the MOST important reason f...
Question 56: Which of the following describes pivoting?...
Question 57: A network administrator has been asked to configure a new ne...
Question 58: An analyst would like to search for a specific text string a...
Question 59: DRAG DROP Drag and drop the following steps in the correct o...
Question 60: Log review shows that large amounts of data are being sent t...
Question 61: An attacker has exfiltrated the SAM file from a Windows work...
Question 62: A DMZ web server has been compromised. During the log review...
Question 63: A file is discovered in the /etc directory of an internal se...
Question 64: An organization needs to determine of any systems on its net...
Question 65: Why is it important to update system clocks from a single ti...
Question 66: A network engineer has collected a packet capture using Wire...
Question 67: Customers are reporting issues connecting to a company's Int...
Question 68: Which of the following are reasons that a hacker would execu...
Question 69: An attacker performs reconnaissance on a Chief Executive Off...
Question 70: A malware analyst has been assigned the task of reverse engi...
Question 71: During the identification phase, it is discovered that port ...
Question 72: Click the exhibit button. After reviewing captured network t...
Question 73: Which of the following types of logs is shown below, and wha...
Question 74: During a malware outbreak, a security analyst has been asked...
Question 75: Which of the following mitigations will remain intact, regar...
Question 76: An attack was performed on a company's web server, disabling...
Question 77: An incident responder has captured packets associated with m...
Question 78: A logfile generated from a Windows server was moved to a Lin...
Question 79: During review of a company's web server logs, the following ...
Question 80: An organization's public information website has been deface...
Question 81: Network engineering has reported low bandwidth during workin...
Question 82: A SOC analyst has been tasked with checking all files in eve...
Question 83: Which of the following techniques allows probing firewall ru...
Question 84: The incident response team needs to track which user last co...
Question 85: Which of the following technologies is used as mitigation to...
Question 86: As part of an incident response effort, data has been collec...
Question 87: During the course of an investigation, an incident responder...
Question 88: An incident responder needs to quickly locate specific data ...
Question 89: An incident responder is asked to create a disk image of a c...
Question 90: Organizations should exercise their Incident Response (IR) p...
Question 91: When performing an investigation, a security analyst needs t...
Question 92: While performing standard maintenance on a UNIX server, a sy...
Question 93: A forensics investigator has been assigned the task of inves...
Question 94: An attacker has sent malicious macro-enabled Office files. W...
Question 95: An unauthorized network scan may be detected by parsing netw...
Question 96: Which of the following is the BEST way to capture all networ...