Which of the following technologies would reduce the risk of a successful SQL injection attack?
Correct Answer:B
A Linux system administrator found suspicious activity on host IP 192.168.10.121. This host is also establishing a connection to IP 88.143.12.123. Which of the following commands should the administrator use to capture only the traffic between the two hosts?
Correct Answer:B
A security administrator needs to review events from different systems located worldwide. Which of the following is MOST important to ensure that logs can be effectively correlated?
Correct Answer:A
If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
Correct Answer:A
Which of the following is the GREATEST risk of having security information and event management (SIEM) collect computer names with older log entries?
Correct Answer:D
During which phase of a vulnerability assessment would a security consultant need to document a requirement to retain a legacy device that is no longer supported and cannot be taken offline?
Correct Answer:C