Question 1

When attempting to determine which system or user is generating excessive web traffic, analysis of which of the following would provide the BEST results?
  • Question 2

    During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?
  • Question 3

    A company website was hacked via the following SQL query:
    email, passwd, login_id, full_name FROM members
    WHERE email = "[email protected]"; DROP TABLE members; -"
    Which of the following did the hackers perform?
  • Question 4

    A first responder notices a file with a large amount of clipboard information stored in it. Which part of the MITRE ATT&CK matrix has the responder discovered?
  • Question 5

    Detailed step-by-step instructions to follow during a security incident are considered: