Question: ** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A security specialist is notified about

** Please with an explanation if possible **

*Please answers all or leave it to another expert*

Question #:1

A security specialist is notified about a certificate warning that users receive when using a new internal website. After being given the URL from one of the users and seeing the warning, the security specialist inspects the certificate and realizes it has been issued to the IP address, which is how the developers reach the site. Which of the following would BEST resolve the issue?

A. OSCP

B. OID

C. PEM

D. SAN

-------------------------------------------------------------------------------------------------------------

Question #:2

A technician has been asked to document which services are running on each of a collection of 200 servers. Which of the following tools BEST meets this need while minimizing the work required?

A. Nmap

B. Nslookup

C. Netcat

D. Netstat

-------------------------------------------------------------------------------------------------------------

Question #:3

Which of the following involves the use of targeted and highly crafted custom attacks against a population of users who may have access to a particular service or program?

Hoaxing

Spear phishing

Vishing

Phishing

------------------------------------------------------------------------------------------------------------- Question #:4

Which of the following may indicate a configuration item has reached end-of-life?

A. The device will no longer turn on and indicates an error

B. The vendor has not published security patches recently.

C. The object has been removed from the Active Directory.

D. Logs show a performance degradation of the component.

-------------------------------------------------------------------------------------------------------------

Question #:5

A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However, the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Select TWO).

Implement time-of-day restrictions.

Modify archived data.

Access executive shared portals.

Create privileged accounts.

Enforce least privilege.

------------------------------------------------------------------------------------------------------------- Question #:6

During certain vulnerability scanning scenarios, It is possible for the target system to react in unexpected ways.

This type of scenario is MOST commonly known as: A . intrusive testing. B . a butter overflow. C . a race condition D . active reconnaissance

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!