Question 221

A security engineer is reviewing log files after a third discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
  • Question 222

    A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:
    Which of the following attacks does the analyst MOST likely see in this packet capture?
  • Question 223

    A Chief Information Officer receives an email stating a database will be encrypted within 24 hours unless a payment of $20,000 is credited to the account mentioned In the email. This BEST describes a scenario related to:
  • Question 224

    A security engineer is setting up passwordless authentication for the first time.
    INSTRUCTIONS
    Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 225

    An analyst visits an Internet forum looking for information about a tool. The analyst finds a thread that appears to contain relevant information. One of the posts says the following:

    Which of the following BEST describes the attack that was attempted against the forum readers?