Question 46

An automatic vulnerability scan has been performed. Which is the next step of the vulnerability assessment process?
  • Question 47

    It was recently discovered that many of an organization's servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
  • Question 48

    A network administrator has determined that network performance has degraded due to excessive use of social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?
  • Question 49

    Senior management has stated that antivirus software must be installed on all employee workstations.
    Which of the following does this statement BEST describe?
  • Question 50

    A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?