Question 11

A security analyst has identified malware spreading through the corporate network and has activated the CSIRT Which of the following should the analyst do NEXT?
  • Question 12

    A security analyst sees the following log output while reviewing web logs:

    Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
  • Question 13

    A security analyst is evaluating solutions to deploy an additional layer of protection for a web application. The goal is to allow only encrypted communications without relying on devices.
    Which of the following can be implemented?
  • Question 14

    A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred.
    Which of the following is the analyst MOST likely seeing?
  • Question 15

    A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output:
    Which of the following attacks does the analyst MOST likely see in this packet capture?