Question 1

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels.
Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?
  • Question 2

    A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite:

    Which of the following is the MOST likely cause of the customer's inability to connect?
  • Question 3

    A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage.
    Which of the following is a security concern that will MOST likely need to be addressed during migration?
  • Question 4

    A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks.
    Which of the following sources could the architect consult to address this security concern?
  • Question 5

    A company recently acquired a SaaS provider and needs to integrate its platform into the company's existing infrastructure without impact to the customer's experience. The SaaS provider does not have a mature security program A recent vulnerability scan of the SaaS provider's systems shows multiple critical vulnerabilities attributed to very old and outdated Oss. Which of the following solutions would prevent these vulnerabilities from being introduced into the company's existing infrastructure?