<< Prev Question Next Question >>

Question 20/96

During an annual penetration test, several rootkit-enabled systems are found to be exfiltrating data. The penetration test team and the internal incident response team work to begin cleanup. The company's operations team offers a new emails server to use for communications during the incident. As cleanup continues, the attackers seem to know exactly what the incident response plan is. Which of the following will prevent the attackers from compromising cleanup activities?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (96q)
Question 1: From a compromised system, an attacker bypasses a proxy serv...
Question 2: Which of the following is the reason that out-of-band commun...
Question 3: A SOC analyst reviews vendor security bulletins and security...
Question 4: A security analyst would like to parse through several SQL l...
Question 5: Which of the following are legally compliant forensics appli...
Question 6: An administrator wants to block Java exploits that were not ...
Question 7: An organization's firewall has recently been bombarded with ...
Question 8: A malicious actor sends a crafted email to the office manage...
Question 9: A system administrator needs to analyze a PCAP file on a Lin...
Question 10: A hacker's end goal is to target the Chief Financial Officer...
Question 11: An attacker has decided to attempt a brute force attack on a...
Question 12: Click the exhibit button. Which of the following Windows too...
Question 13: A suspicious laptop is found in a datacenter. The laptop is ...
Question 14: A user reports a pop-up error when starting a Windows machin...
Question 15: While a network administrator is monitoring the company netw...
Question 16: A security analyst for a financial services firm is monitori...
Question 17: Which of the following tools can be used to identify open po...
Question 18: A UNIX workstation has been compromised. The security analys...
Question 19: An outside organization has reported to the Chief Informatio...
Question 20: During an annual penetration test, several rootkit-enabled s...
Question 21: Which of the following can hackers use to gain access to a s...
Question 22: A high-level government official uses anonymous bank account...
Question 23: A system administrator is informed that a user received an e...
Question 24: A malicious attacker has compromised a database by implement...
Question 25: DRAG DROP Drag and drop the following steps to perform a suc...
Question 26: An incident responder is investigating a Linux server report...
Question 27: When investigating a wireless attack, which of the following...
Question 28: The Chief Information Officer (CIO) of a company asks the in...
Question 29: An organization performs regular updates to its network devi...
Question 30: (Exhibit) The above Linux command is used to search for:...
Question 31: During an investigation on Windows 10 system, a system admin...
Question 32: Which of the following is an automated password cracking tec...
Question 33: Which of the following commands should be used to print out ...
Question 34: An incident responder notices many entries in an apache acce...
Question 35: An incident responder suspects that a host behind a firewall...
Question 36: An intruder gains physical access to a company's headquarter...
Question 37: While reviewing some audit logs, an analyst has identified c...
Question 38: Which of the following resources BEST supports malware analy...
Question 39: A forensics analyst is analyzing an executable and thinks it...
Question 40: DRAG DROP When perpetrating an attack, there are often a num...
Question 41: A security analyst discovers a zero-day vulnerability affect...
Question 42: A security professional has been tasked with the protection ...
Question 43: A computer attacker has compromised a system by implanting a...
Question 44: Malicious code that can replicate itself using various techn...
Question 45: A Windows system user reports seeing a command prompt window...
Question 46: An alert has been triggered identifying a new application ru...
Question 47: An alert on user account activity outside of normal business...
Question 48: A security auditor has been asked to analyze event logs to l...
Question 49: Which of the following protocols can be used for data extens...
Question 50: During a network-based attack, which of the following data s...
Question 51: A zero-day vulnerability is discovered on a company's networ...
Question 52: A company website was hacked via the SQL query below: (Exhib...
Question 53: When determining the threats/vulnerabilities to migrate, it ...
Question 54: Which of the following could an attacker use to perpetrate a...
Question 55: Which of the following describes the MOST important reason f...
Question 56: Which of the following describes pivoting?...
Question 57: A network administrator has been asked to configure a new ne...
Question 58: An analyst would like to search for a specific text string a...
Question 59: DRAG DROP Drag and drop the following steps in the correct o...
Question 60: Log review shows that large amounts of data are being sent t...
Question 61: An attacker has exfiltrated the SAM file from a Windows work...
Question 62: A DMZ web server has been compromised. During the log review...
Question 63: A file is discovered in the /etc directory of an internal se...
Question 64: An organization needs to determine of any systems on its net...
Question 65: Why is it important to update system clocks from a single ti...
Question 66: A network engineer has collected a packet capture using Wire...
Question 67: Customers are reporting issues connecting to a company's Int...
Question 68: Which of the following are reasons that a hacker would execu...
Question 69: An attacker performs reconnaissance on a Chief Executive Off...
Question 70: A malware analyst has been assigned the task of reverse engi...
Question 71: During the identification phase, it is discovered that port ...
Question 72: Click the exhibit button. After reviewing captured network t...
Question 73: Which of the following types of logs is shown below, and wha...
Question 74: During a malware outbreak, a security analyst has been asked...
Question 75: Which of the following mitigations will remain intact, regar...
Question 76: An attack was performed on a company's web server, disabling...
Question 77: An incident responder has captured packets associated with m...
Question 78: A logfile generated from a Windows server was moved to a Lin...
Question 79: During review of a company's web server logs, the following ...
Question 80: An organization's public information website has been deface...
Question 81: Network engineering has reported low bandwidth during workin...
Question 82: A SOC analyst has been tasked with checking all files in eve...
Question 83: Which of the following techniques allows probing firewall ru...
Question 84: The incident response team needs to track which user last co...
Question 85: Which of the following technologies is used as mitigation to...
Question 86: As part of an incident response effort, data has been collec...
Question 87: During the course of an investigation, an incident responder...
Question 88: An incident responder needs to quickly locate specific data ...
Question 89: An incident responder is asked to create a disk image of a c...
Question 90: Organizations should exercise their Incident Response (IR) p...
Question 91: When performing an investigation, a security analyst needs t...
Question 92: While performing standard maintenance on a UNIX server, a sy...
Question 93: A forensics investigator has been assigned the task of inves...
Question 94: An attacker has sent malicious macro-enabled Office files. W...
Question 95: An unauthorized network scan may be detected by parsing netw...
Question 96: Which of the following is the BEST way to capture all networ...