Question 6

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?
  • Question 7

    A security analyst is investigating a call from a user regarding one of the websites receiving a
    503: Service Unavailableerror. The analyst runs a netstat-ancommand to discover if the web server is up and listening. The analyst receives the following output:
    TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
    TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
    TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
    TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
    TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
    TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
    Which of the following types of attack is the analyst seeing?
  • Question 8

    The website http://companywebsite.com requires users to provide personal information including security responses, for registration. which of the following would MOST likely cause a date breach?
  • Question 9

    A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for a particular string Which of the following would be BEST to use to accomplish the task? (Select TWO).
  • Question 10

    A SECURITY ANALYST NEEDS TO FIND REAL-TIME DATA ON THE LATEST MALWARE AND loCs WHICH OF THE FOLLOWING BEST DESCRIBE THE SOLUTION THE ANALYST SHOULD PERSUE?