Question 126

A cybersecurity consultant found common vulnerabilities across the following services used by multiple servers at an organization: VPN, SSH, and HTTPS. Which of the following is the MOST likely reason for the discovered vulnerabilities?
  • Question 127

    During an investigation, an analyst discovers the following rule in an executive's email client:
    IF * TO <[email protected]> THEN mailto: <[email protected]> SELECT FROM 'sent' THEN DELETE FROM <[email protected]> The executive is not aware of this rule. Which of the following should the analyst do FIRST to evaluate the potential impact of this security incident?
  • Question 128

    A worm was detected on multiple PCs within the remote office. The security analyst recommended that the remote office be blocked from the corporate network during the incident response. Which of the following processes BEST describes this recommendation?
  • Question 129

    A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in the DMZ:
    * SQL injection on an infrequently used web server that provides files to vendors
    * SSL/TLS not used for a website that contains promotional information
    The scan also shows the following vulnerabilities on internal resources:
    * Microsoft Office Remote Code Execution on test server for a human resources system
    * TLS downgrade vulnerability on a server in a development network
    In order of risk, which of the following should be patched FIRST?
  • Question 130

    Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the BEST solution to improve the equipment's security posture?