Question 401
A forensic analyst suspects that a buffer overflow exists in a kernel module. The analyst executes the following command:
dd if=/dev/ram of=/tmp/mem/dmp
The analyst then reviews the associated output:
^34^#AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/bin/bash^21^03#45
However, the analyst is unable to find any evidence of the running shell. Which of the following of the MOST likely reason the analyst cannot find a process ID for the shell?
dd if=/dev/ram of=/tmp/mem/dmp
The analyst then reviews the associated output:
^34^#AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/bin/bash^21^03#45
However, the analyst is unable to find any evidence of the running shell. Which of the following of the MOST likely reason the analyst cannot find a process ID for the shell?
Question 402
A large international business has completed the acquisition of a small business and it is now in the process of integrating the small business' IT department.
Both parties have agreed that the large business will retain 95% of the smaller business' IT staff.
Additionally, the larger business has a strong interest in specific processes that the smaller business has in place to handle its regional interests.
Which of the following IT security related objectives should the small business' IT staff consider reviewing during the integration process? (Select TWO).
Both parties have agreed that the large business will retain 95% of the smaller business' IT staff.
Additionally, the larger business has a strong interest in specific processes that the smaller business has in place to handle its regional interests.
Which of the following IT security related objectives should the small business' IT staff consider reviewing during the integration process? (Select TWO).
Question 403
Company XYZ finds itself using more cloud-based business tools, and password management is becoming onerous. Security is important to the company; as a result, password replication and shared accounts are not acceptable. Which of the following implementations addresses the distributed login with centralized authentication and has wide compatibility among SaaS vendors?
Question 404
A security administrator is assessing a new application. The application uses an API that is supposed to encrypt text strings that are stored in memory. How might the administrator test that the strings are indeed encrypted in memory?
Question 405
A security administrator wants to implement controls to harden company-owned mobile devices. Company policy specifies the following requirements:
* Mandatory access control must be enforced by the OS.
* Devices must only use the mobile carrier data transport.
Which of the following controls should the security administrator implement? (Choose three.)
* Mandatory access control must be enforced by the OS.
* Devices must only use the mobile carrier data transport.
Which of the following controls should the security administrator implement? (Choose three.)