1.
A malicious actor sends a crafted email to the office manager using personal information collected from social media. This type of social engineering attack is known as:
2.
A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
3.
Which of the following techniques allows probing firewall rule sets and finding entry points into a targeted system or network?
4.
A security professional has been tasked with the protection of a specific set of information essential to a corporation's livelihood, the exposure of which could cost the company billions of dollars in long-term revenue. The professional is interested in obtaining advice for preventing the theft of this type of information. Which of the following is the BEST resource for finding this material?
5.
When determining the threats/vulnerabilities to migrate, it is important to identify which are applicable. Which of the following is the FIRST step to determine applicability?
6.
A malicious attacker has compromised a database by implementing a Python-based script that will automatically establish an SSH connection daily between the hours of 2:00 am and 5:00 am. Which of the following is the MOST common motive for the attack vector that was used?
7.
Which of the following tools can be used to identify open ports and services?
8.
Which of the following protocols can be used for data extension?
9.
A Windows system user reports seeing a command prompt window pop up briefly during each login. In which of the following locations would an incident responder check to explain this activity?
10.
An incident responder is asked to create a disk image of a compromised Linux server. Which of the following commands should be used to do this?