1. An analyst is using a vulnerability scanner to look for common security misconfigurations on devices. Which of the following might be identified by the scanner? (Select TWO).(Select 2answers)
A) The firewall is disabled on workstations.
B) SSH is enabled on servers.
C) Browser homepages have not been customized.
D) Default administrator credentials exist on networking hardware.
E) The OS is only set to check for updates once a day.
2. An analyst receives an alert from the SIEM showing an IP address that does not belong to the assigned network can be seen sending packets to the wrong gateway. Which of the following network devices is misconfigured and which of the following should be done to remediate the issue?
A) Firewall,implement an ACL on the interface
B) Router,place the correct subnet on the interface
C) Switch,modify the access port to trunk port
D) Proxy,add the correct transparent interface
3. An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
A) PEAP
B) EAP
C) WPA2
D) RADIUS
4. An application developer has neglected to include input validation checks in the design of the company - s new web application. An employee discovers that repeatedly submitting large amounts of data,including custom code,to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?
A) Cross-site scripting
B) Clickjacking
C) Buffer overflow
D) Replay
5. An application developer is designing an application involving secure transports from one service to another that will pass over port 80 for a request. Which of the following secure protocols is the developer MOST likely to use?
A) FTPS
B) SFTP
C) SSL
D) LDAPS
E) SSH
Write a public review