1. DLP solution is showing some unidentified encrypted data is sent via FTP to a remote server. A vulnerability scan found a collection of Linux servers that lack OS level patches. Upon further investigation, a technician notices that some unknown processes on a number of servers. What would perform an important first step in data security team at this point?
A) Reboot the Linux servers, check running processes, and install required patches.
B) Remove a single Linux server production and place in quarantine.
C) ID data capture process and impose anti-virus vendor for review.
D) Slightly higher management of a security breach.
E) Behavior image a bit level, including RAM, one or more of the Linux servers.
2. An international shipping company discovered that the supplies are tampered left inactive. The company wants the idle time for international deliveries by ensuring that staff automatically notified when an incoming delivery approaches to reduce the transit dock. Which of the following should be done to help the company to increase the security posture of its activities?
A) None
B) Geo-fencing
C) achieved results
D) barcode Scanner
E) Back office database
3. An insurance company has an online quote system for insurance. It allows potential customers in specific details about their car to complete and obtain a quote. During the investigation the following were discovered patterns: Pattern 1 The analysis of the logs identifies insurance forms are completed, but only some fields will be updated incrementally. Pattern 2 For every completed quote, create a new account number; due to legacy systems, runs the number of customers. Which of the following is the attack type, the system is susceptible to, and what is the best way to defend against it? (Choose two).(Select 2answers)
A) Enter a black list of known malware BOT IPs at the firewall
B) WAF inline implement and integrate SIEM
C) Resource exhaustion attack
D) Cross site scripting attack
E) Bring a hidden field which triggers an alert SIEM
4. An IT manager is working with a project manager from another subsidiary of the same multinational organization. The project manager is responsible for a new software-development effort that is outsourced overseas, and acceptance testing by the customer will be done in house. Which of the following is most likely to cause problems with the availability of the network?
A) Source code vulnerability scanning
B) ISP ISP network jitter
C) End-to-end network encryption to
D) File validation
E) Time-based access control lists
5. A finance manager says that the company needs to ensure it can play the new system data, to the minute, followed for each exchange by the investment departments. The finance manager also says that the company's transactions must be maintained against this data for a period of five years for compliance. How a security engineer BEST would interpret the needs of the finance manager?
A) data storage
B) acceptance testing
C) data elements
D) compliance standards
E) User requirements
Leave a comment