Question 91

A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:

To better understand what is going on, the analyst runs a command and receives the following output:

Based on the analyst's findings, which of the following attacks is being executed?
  • Question 92

    The security administrator has installed a new firewall which implements an implicit DENY policy by default.
    INSTRUCTIONS:
    Click on the firewall and configure it to allow ONLY the following communication.
    1. The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks.
    2. The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port
    3. The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.
    Instructions: The firewall will process the rules in a top-down manner in order as a first match The port number must be typed in and only one port number can be entered per rule Type ANY for all ports. The original firewall configuration can be reset at any time by pressing the reset button. Once you have met the simulation requirements, click save and then Done to submit.

    Hot Area:

    Question 93

    A security engineer is setting up passwordless authentication for the first time.
    INSTRUCTIONS
    Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 94

    A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:

    Which of the following attacks does the analyst MOST likely see in this packet capture?
  • Question 95

    Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:
    * Multiple reports of breached credentials within that time period
    * Traffic being redirected in certain parts of the network
    * Fraudulent emails being sent by various internal users without their consent Which of the following types of attacks was MOST likely used?