Question 131

A centralized tool for organizing security events and managing their response and resolution is known as:
  • Question 132

    A company has been a victim of multiple volumetric DoS attacks. Packet analysis of the offending traffic shows the following:

    Which of the following mitigation techniques is MOST effective against the above attack?
  • Question 133

    A security analyst is performing ongoing scanning and continuous monitoring of the corporate datacenter. Over time, these scans are repeatedly showing susceptibility to the same vulnerabilities and an increase in new vulnerabilities on a specific group of servers that are clustered to run the same application. Which of the following vulnerability management processes should be implemented?
  • Question 134

    The software development team pushed a new web application into production for the accounting
    department. Shortly after the application was published, the head of the accounting department informed
    IT operations that the application was not performing as intended. Which of the following SDLC best
    practices was missed?
  • Question 135

    A security analyst begins to notice the CPU utilization from a sinkhole has begun to spike. Which of the following describes what may be occurring?