An external penetration tester compromised one of the client organization's authentication servers and retrieved the password database. Which of the following
methods allows the penetration tester to MOST efficiently use any obtained administrative credentials on the client organization's other systems, without impacting
the integrity of any of the systems?
A web services company is planning a one-time high-profile event to be hosted on the corporate website. An outage, due to an attack, would be publicly
embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary preventive controls in place. Which of the
following would MOST appropriately address Joe's concerns?
Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black
box methodology.
Which of the following would be the advantage of conducting this kind of penetration test?
Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap command
string:
user@hostname:~$ sudo nmap O 192.168.1.54
Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device:
TCP/22
TCP/111
TCP/512-514
TCP/2049
TCP/32778
Based on this information, which of the following operating systems is MOST likely running on the unknown node?
A security engineer is responsible for monitoring company applications for known vulnerabilities. Which of the following is a way to stay current on exploits and
information security news?
The Chief Executive Officer (CEO) of a small start-up company wants to set up offices around the country for the sales staff to generate business. The company
needs an effective communication solution to remain in constant contact with each other, while maintaining a secure business environment. A junior-level
administrator suggests that the company and the sales staff stay connected via free social media. Which of the following decisions is BEST for the CEO to make?
News outlets are beginning to report on a number of retail establishments that are experiencing payment card data breaches. The data exfiltration is enabled by
malware on a compromised computer. After the initial exploit, network mapping and fingerprinting is conducted to prepare for further exploitation. Which of the
following is the MOST effective solution to protect against unrecognized malware infections?
A security administrator notices a recent increase in workstations becoming compromised by malware. Often, the malware is delivered via drive-by downloads,
from malware hosting websites, and is not being detected by the corporate antivirus. Which of the following solutions would provide the BEST protection for the
company?
A security administrator wants to calculate the ROI of a security design which includes the purchase of new equipment. The equipment costs $50,000 and it will
take 50 hours to install and configure the equipment. The administrator plans to hire a contractor at a rate of $100/hour to do the installation. Given that the new
design and equipment will allow the company to increase revenue and make an additional $100,000 on the first year, which of the following is the ROI expressed as
a percentage for the first year?
A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it was
determined that it takes three changes to deploy a new application onto the network before it is operational. Security now has a significant effect on overall
availability. Which of the following would be the FIRST process to perform as a result of these findings?