A junior security analyst opened ports on the company’s firewall, and the company experienced a data breach. Which of the following most likely caused the data breach?
A user is suspected of violating policy by logging in to a Linux VM during non-business hours. Which of the following system files is the best way to track the user’s activities?
A company has recently experienced a security breach via a public-facing service. Analysis of the event on the server was traced back to the following piece of code:SELECT * From user_data WHERE Username = 0 and userid= 1 or 1=1;--Which of the following controls would be best to implement?
HOTSPOT-A systems administrator is reviewing the output of a vulnerability scan.INSTRUCTIONS-Review the information in each tab.Based on the organization’s environment architecture and remediation standards, select the server to be patched within 14 days and select the appropriate technique and mitigation.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
An organization performs software assurance activities and reviews some web framework code that uses exploitable jquery modules. Which of the following tools or techniques should the organization use to help identify these issues?
A third-party assessment of a recent incident determined that the incident response team spent too long trying to get the scope needed for the incident timeline and too much time was spent searching for false positives. Which of the following should the team work on first?