Question 66

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)
  • Question 67

    Refer to the exhibit.

    Where does it signify that a page will be stopped from loading when a scripting attack is detected?
  • Question 68

    Refer to the exhibit.

    At which stage of the threat kill chain is an attacker, based on these URIs of inbound web requests from known malicious Internet scanners?
  • Question 69

    An engineer has created a bash script to automate a complicated process. During script execution, this error occurs: permission denied. Which command must be added to execute this script?
  • Question 70


    Refer to the exhibit. An engineer received a report that an attacker has compromised a workstation and gained access to sensitive customer data from the network using insecure protocols. Which action prevents this type of attack in the future?