Question 96

A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files, and can work in conjunction with proxies or UTM.
Which of the following would BEST meet the CSO's requirements?
  • Question 97

    An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139.
    Which of the following sources should the analyst review to BEST ascertain how the Incident could have been prevented?
  • Question 98

    An organization has hired a ted team to simulate attacks on its security posture Which of the following will the blue team do after detecting an loC?
  • Question 99

    A company Is concerned about is security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the Internet and running NTLMV1,
    Which of the following BEST explains the findings?
  • Question 100

    A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:

    Which of the following attacks does the analyst MOST likely see in this packet capture?