Question 26
A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?
Question 27
Which of the following is the MOST effective control against zero-day vulnerabilities?
Question 28
A vulnerability has been discovered and a known patch to address the vulnerability does not exist. Which of the following controls works BEST until a proper fix is released?
Question 29
Which of the following prevents an employee from seeing a colleague who is visting an inappropriate website?
Question 30
The Chief information Security Officer wants to prevent exfilitration of sensitive information from employee cell phones when using public USB power charging stations. Which of the following would be the Best solution to implement?