Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?
Correct Answer:D
A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST likely used by the analyst for the initial discovery?
Correct Answer:C
While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)
Correct Answer:AC
Which of the following are legally compliant forensics applications that will detect an alternative data stream (ADS) or a file with an incorrect file extension? (Choose two.)
Correct Answer:BD
It was recently discovered that many of an organization’s servers were running unauthorized cryptocurrency mining software. Which of the following assets were being targeted in this attack? (Choose two.)
Correct Answer:AB
While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective during the investigation?
Correct Answer:C