Question 196

A cybersecurity consultant found common vulnerabilities across the Mowing, services used by multiple severs at an organization: VPN. SSH, and Ml I PS. Which of the following is the MOST likely reason for the discovered vulnerabilities?
  • Question 197

    A security analyst performed a review of an organization's software development life cycle.
    The analyst reports that the life cycle does not contain a phase m which team members evaluate and provide critical feedback on another developer's code. Which of the following assessment techniques is BEST for describing the analyst's report?
  • Question 198

    Alerts have been received from the SIEM, indicating infections on multiple computers.
    Based on threat characteristic, these files were quarantined by the host-based antivirus program. At the same time, additional alerts in the SIEM show multiple blocked URLs from the address of the infected computers; the URLs were clashed as uncategorized. The domain location of the IP address of the URLs that were blocked is checked, and it is registered to an ISP in Russia. Which of the following steps should be taken NEXT?
  • Question 199

    A penetration tester is preparing for an audit of critical that may impact the security of the environment. The includes the external perimeter and the intermitted of the environment.
    During which of the following processes is this type information normally gathered?
  • Question 200

    The Chief Security Officer (CSO) has requested a vulnerability report of systems on the domain, identifying
    those running outdated OSs. The automated scan reports are not displaying OS version details, so the
    CSO cannot determine risk exposure levels from vulnerable systems. Which of the following should the
    cybersecurity analyst do to enumerate OS information as part of the vulnerability scanning process in the
    MOST efficient manner?