Question 151

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
  • Question 152

    A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)
  • Question 153

    A security analyst is investigating some users who are being redirected to a fake website that resembles www.comptia.org. The following output was found on the naming server of the organization:

    Which of the following attacks has taken place?
  • Question 154

    An attacker has successfully exfiltrated several non-salted password hashes from an online system. Given the logs below:

    Which of the following BEST describes the type of password attack the attacker is performing?
  • Question 155

    Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations.
    Which of the following documents did Ann receive?