Question 31

A security engineer is setting up passwordless authentication for the first time.
INSTRUCTIONS
Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question 32

An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
The firm has been given all the developer's documentation about the internal architecture. Which of the following BEST represents the type of testing that will occur?
  • Question 33

    Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
    INSTRUCTIONS
    Not all attacks and remediation actions will be used.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

    Question 34

    In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?
  • Question 35

    A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers.
    Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?