Question 121

A security analyst is reviewing an endpoint that was found to have a rookit installed. The rootkit survived multiple attempts to clean the endpoints, as well as an attempt to reinstall the QS. The security analyst needs to implement a method to prevent other endpoint from having similar issues. Which of the following would BEST accomplish this objective?
  • Question 122

    Due to a recent acquisition, the security team must find a way to secure several legacy applications. During a review of the applications, the following issues are documented:
    The applications are considered mission-critical.
    The applications are written in code languages not currently supported by the development staff.
    Security updates and patches will not be made available for the applications.
    Username and passwords do not meet corporate standards.
    The data contained within the applications includes both PII and PHI.
    The applications communicate using TLS 1.0.
    Only internal users access the applications.
    Which of the following should be utilized to reduce the risk associated with these applications and their current architecture?
  • Question 123

    A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?
  • Question 124

    A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded.
    Which of the following should be used to identify weak processes and other vulnerabilities?
  • Question 125

    An online bank has contracted with a consultant to perform a security assessment of the bank's web portal. The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site. Which of the following is a concern for the consultant, and how can it be mitigated?