Question 106

In system hardening, which of the following types of vulnerability scans would work BEST to verify the scanned device meets security policies?
  • Question 107

    During an incident investigation, a security analyst acquired a malicious file that was used as a backdoor but was not detected by the antivirus application. After performing a reverse-engineering procedure, the analyst found that part of the code was obfuscated to avoid signature detection. Which of the following types of instructions should the analyst use to understand how the malware was obfuscated and to help deobfuscate it?
  • Question 108

    An organization is performing vendor selection activities for penetration testing, and a security analyst is reviewing the MOA and rules of engagement, which were supplied with proposals.
    Which of the following should the analyst expect will be included in the documents and why?
  • Question 109

    Hotspot Question
    A security analyst performs various types of vulnerability scans. You must review the vulnerability scan results to determine the type of scan that was executed and determine if a false positive occurred for each device.
    Instructions:
    Select the drop option for whether the results were generated from a credentialed scan, non- credentialed scan, or a compliance scan.
    For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives.
    NOTE: If you would like to uncheck an option that is currently selected, click on the option a second time. Lastly, based on the vulnerability scan results, identify the type of Server by dragging the Server to the results.
    The Linux Web Server, File-Print Server and Directory Server are draggable. If at any time you would like to bring back the initial state of the simulation, please select the Reset button. When you have completed the simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.

    Question 110

    An information security analyst discovered a virtual machine server was compromised by an attacker. Which of the following should be the FIRST step to confirm and respond to the incident?