Question 276
When viewing IPS logs the administrator see systems all over the world scanning the network for servers with port 22 open. The administrator concludes that this traffic is a(N):
Question 277
A website administrator has received an alert from an application designed to check the integrity of the
company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon
further investigation, the media appears to be the same as it was before the alert.
Which of the following methods has MOST likely been used?
company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon
further investigation, the media appears to be the same as it was before the alert.
Which of the following methods has MOST likely been used?
Question 278
An organization identifies a number of hosts making outbound connections to a known malicious IP over port TCP 80. The organization wants to identify the data being transmitted and prevent future connections to this IP.
Which of the following should the organization do to achieve this outcome?
Which of the following should the organization do to achieve this outcome?
Question 279
Which of the following terms BEST describes an exploitable vulnerability that exists but has not been publicly disclosed yet?
Question 280
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the
MOST likely risk in this situation?
MOST likely risk in this situation?