Question 86

Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue.
INSTRUCTIONS
Click on me ticket to see the ticket details Additional content is available on tabs within the ticket First, select the appropriate issue from the drop-down menu. Then, select the MOST likely root cause from second drop-down menu If at any time you would like to bring back the initial state of the simulation, please click the Reset All button

Question 87

While implementing a PKI for a company, a security analyst plans to utilize a dedicated server as the certAcate authority that is only used to sign intermediate certificates. Which of the following are the MOST secure states for the certificate authority server when it is not in use? (Select TWO)
  • Question 88

    Because some clients have reported unauthorized activity on their accounts, a security analyst is reviewing network packet captures from the company's API server. A portion of a capture file is shown below:
    POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="http://schemas.s/soap/envelope/
    "><s:Body><GetIPLocation+xmlns="
    <request+xmlns:a="http://schemas.somesite.org http://www.w3.org/2001/XMLSchema-instance
    "></s:Body></s:Envelope> 192.168.1.22 - - api.somesite.com 200 0 1006 1001 0 192.168.1.22 POST /services/v1_0/Public/Members.svc/soap
    <<a:Password>Password123</a:Password><a:ResetPasswordToken+i:nil="true"/>
    <a:ShouldImpersonatedAuthenticationBePopulated+i:nil="true"/><a:Username>[email protected]
    192.168.5.66 - - api.somesite.com 200 0 11558 1712 2024 192.168.4.89
    POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="
    http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetIPLocation+xmlns="http://tempuri.org/">
    <a:IPAddress>516.7.446.605</a:IPAddress><a:ZipCode+i:nil="true"/></request></GetIPLocation></s:Body><
    192.168.1.22 - - api.somesite.com 200 0 1003 1011 307 192.168.1.22
    POST /services/v1_0/Public/Members.svc/soap <s:Envelope+xmlns:s="
    http://schemas.xmlsoap.org/soap/envelope/"><s:Body><IsLoggedIn+xmlns="http://tempuri.org/">
    <request+xmlns:a="http://schemas.datacontract.org/2004/07/somesite.web+xmlns:i="
    http://www.w3.org/2001/XMLSchema-instance"><a:Authentication>
    <a:ApiToken>kmL4krg2CwwWBan5BReGv5Djb7syxXTNKcWFuSjd</a:ApiToken><a:ImpersonateUserId>0<
    <a:NetworkId>4</a:NetworkId><a:ProviderId>''1=1</a:ProviderId><a:UserId>13026046</a:UserId></a:Authe
    192.168.5.66 - - api.somesite.com 200 0 1378 1209 48 192.168.4.89
    Which of the following MOST likely explains how the clients' accounts were compromised?
  • Question 89

    A company is developing its first mobile application, which will be distributed via the official application stores of the two major mobile platforms.
    Which of the following is a prerequisite to making the applications available in the application stores?
  • Question 90

    An analyst is examining a system that is suspected of being involved in an intrusion.
    The analyst uses the command `cat/etc/passwd' and receives the following partial output:

    Based on the above output, which of the following should the analyst investigate further?