1.
Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections?
2.
A user, Ann, is reporting to the company IT support group that her workstation screen is blank other than a window with a message requesting payment or else her hard drive will be formatted. Which of the following types of malware is on Ann's workstation?
3.
A way to assure data at-rest is secure even in the event of loss or theft is to usE.
4.
A security audit identifies a number of large email messages being sent by a specific user from their company email account to another address external to the company. These messages were sent prior to a company data breach, which prompted the security audit. The user was one of a few people who had\ access to the leaked data. Review of the suspect's emails show they consist mostly of pictures of the user at various locations during a recent vacation. No suspicious activities from other users who have access to the data were discovered. Which of the following is occurring?
5.
A security analyst is reviewing firewall logs while investigating a compromised web server. The following
ports appear in the loG.
22, 25, 445, 1433, 3128, 3389, 6667
Which of the following protocols was used to access the server remotely?