Question 106
A recently issued audit report highlight exception related to end-user handling of sensitive data access and credentials. A security manager is addressing the findings. Which of the following activities should be implemented?
Question 107
A security analyst is conducting traffic analysis and observes an HTTP POST to a web server. The POST header is approximately 1000 bytes in length. During transmission, one byte is delivered every ten seconds.
Which of the following attacks is the traffic indicative of?
Which of the following attacks is the traffic indicative of?
Question 108
On winch of the following organizational resources is the lack of an enabled password or PIN a common vulnerability?
Question 109
Which of the following items represents a document that includes detailed information on when an incident
was detected, how impactful the incident was, and how it was remediated, in addition to incident response
effectiveness and any identified gaps needing improvement?
was detected, how impactful the incident was, and how it was remediated, in addition to incident response
effectiveness and any identified gaps needing improvement?
Question 110
A security incident has been created after noticing unusual behavior from a Windows domain controller. The server administrator has discovered that a user logged in to the server with elevated permissions, but the user's account does not follow the standard corporate naming scheme. There are also several other accounts in the administrators group that do not follow this naming scheme. Which of the following is the possible cause for this behavior and the BEST remediation step?