Question 306

A security analyst has received several reports of an issue on an internal web application. Users state they are having to provide their credentials twice to log in. The analyst checks with the application team and notes this is not an expected behavior. After looking at several logs, the analyst decides to run some commands on the gateway and obtains the following output:

Which of the following BEST describes the attack the company is experiencing?
  • Question 307

    A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Choose two.)
  • Question 308

    A company wants to configure its wireless network to require username and password authentication. Which of the following should the systems administrator implement?
  • Question 309

    Which of the following is unique to a stream cipher?
  • Question 310

    After a security assessment was performed on the enterprise network, it was discovered that:
    * Configuration changes have been made by users without the consent of IT.
    * Network congestion has increased due to the use of social media.
    * Users are accessing file folders and network shares that are beyond the scope of their need to know.
    Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)