Question 201

Which of the following is the BEST security practice to prevent ActiveX controls from running malicious code on a user's web application?
  • Question 202

    Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue.
    INSTRUCTIONS
    Click on me ticket to see the ticket details Additional content is available on tabs within the ticket First, select the appropriate issue from the drop-down menu. Then, select the MOST likely root cause from second drop-down menu If at any time you would like to bring back the initial state of the simulation, please click the Reset All button

    Question 203

    You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not.
    The company's hardening guidelines indicate the following:
    * TLS 1.2 is the only version of TLS running.
    * Apache 2.4.18 or greater should be used.
    * Only default ports should be used.
    INSTRUCTIONS
    Using the supplied data, record the status of compliance with the company's guidelines for each server.
    The question contains two parts: make sure you complete Part 1 and Part 2. Make recommendations for issues based ONLY on the hardening guidelines provided.




  • Question 204

    An analyst identifies multiple instances of node-to-node communication between several endpoints within the
    10.200.2.0/24 network and a user machine at the IP address 10.200.2.5. This user machine at the IP address
    10.200.2.5 is also identified as initiating outbound communication during atypical business hours with several IP addresses that have recently appeared on threat feeds.
    Which of the following can be inferred from this activity?
  • Question 205

    While reviewing web server logs, a security analyst notices the following code:

    Which of the following would prevent this code from performing malicious actions?