Question 16

Which of the following is the appropriate phase in the incident response process to perform a vulnerability scan to determine the effectiveness of corrective actions?
  • Question 17

    While reviewing the web server logs, a security analyst notices the following snippet:
    .. \ .. / .. \ .. /boot.ini
    Which of the following Is belng attempted?
  • Question 18

    During the log analysis phase, the following suspicious command is detected-

    Which of the following is being attempted?
  • Question 19

    After a recent vulnerability report for a server is presented, a business must decide whether to secure the company's web-based storefront or shut it down. The developer is not able to fix the zero-day vulnerability because a patch does not exist yet. Which of the following is the best option for the business?
  • Question 20

    An organization plans to use an advanced machine-learning tool as a central collection server.
    The tool will perform data aggregation and analysis. Which of the following should the organization implement?