Question 66

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?
  • Question 67

    An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report:

    Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?
  • Question 68

    An organization's hunt team thinks a persistent threats exists and already has a foothold in the enterprise network.
    Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?