Question 13

Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?

Correct Answer:D

Question 14

A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST likely used by the analyst for the initial discovery?

Correct Answer:C

Question 15

While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)

Correct Answer:AC

Question 16

Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)

Correct Answer:BD

Question 17

It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)

Correct Answer:AB

Question 18

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?

Correct Answer:C

START CFR-410 EXAM