Question: ** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A security specialist is notified about
** Please with an explanation if possible **
*Please answers all or leave it to another expert*
Question #:1
A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue?
A. OSCP
B. OID
C. PEM
D. SAN
-------------------------------------------------------------------------------------------------------------
Question #:2
A technician has been asked to document which services are running on each of a collection of 200 servers. Which of the following tools BEST meets this need while minimizing the work required?
A. Nmap
B. Nslookup
C. Netcat
D. Netstat
-------------------------------------------------------------------------------------------------------------
Question #:3
Which of the following involves the use of targeted and highly crafted custom attacks against a population of users who may have access to a particular service or program?
Hoaxing
Spear phishing
Vishing
Phishing
------------------------------------------------------------------------------------------------------------- Question #:4
Which of the following may indicate a configuration item has reached end-of-life?
A. The device will no longer turn on and indicates an error
B. The vendor has not published security patches recently.
C. The object has been removed from the Active Directory.
D. Logs show a performance degradation of the component.
-------------------------------------------------------------------------------------------------------------
Question #:5
A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However, the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Select TWO).
Implement time-of-day restrictions.
Modify archived data.
Access executive shared portals.
Create privileged accounts.
Enforce least privilege.
------------------------------------------------------------------------------------------------------------- Question #:6
During certain vulnerability scanning scenarios, It is possible for the target system to react in unexpected ways.
This type of scenario is MOST commonly known as: A . intrusive testing. B . a butter overflow. C . a race condition D . active reconnaissance
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
