Company A permits visiting business partners from Company B to utilize Ethernet ports available in Company As
conference rooms. This access is provided to allow partners the ability to establish VPNs back to Company Bs network. The
security architect for Company A wants to ensure partners from Company B are able to gain direct Internet access from
available ports only, while Company A employees can gain access to the Company A internal network from those same
ports. Which of the following can be employed to allow this?
D
File integrity monitoring states the following files have been changed without a written request or approved change. The
following change has been made:
chmod 777 Rv /usr
Which of the following may be occurring?
C
A company has a popular shopping cart website hosted geographically diverse locations. The company has started hosting
static content on a content delivery network (CDN) to improve performance. The CDN provider has reported the company is
occasionally sending attack traffic to other CDN-hosted targets.
Which of the following has MOST likely occurred?
D
During a quarterly review of user accounts and activity, a security analyst noticed that after a password reset the head of
human resources has been logging in from multiple external locations, including several overseas. Further review of the
account showed access rights to a number of corporate applications, including a sensitive accounting application used for
employee bonuses. Which of the following security methods could be used to mitigate this risk?
B
Given a packet capture of the following scan:
Which of the following should MOST likely be inferred on the scans output?
D
During a physical penetration test at a client site, a local law enforcement officer stumbled upon the test questioned the
legitimacy of the team.
Which of the following information should be shown to the officer?
A
A company office was broken into over the weekend. The office manager contacts the IT security group to provide details on
which servers were stolen. The security analyst determines one of the stolen servers contained a list of customer PII
information, and another server contained a copy of the credit card transactions processed on the Friday before the break-in.
In addition to potential security implications of information that could be gleaned from those servers and the
rebuilding/restoring of the data on the stolen systems, the analyst needs to determine any communication or notification
requirements with respect to the incident. Which of the following items is MOST important when determining what
information needs to be provided, who should be contacted, and when the communication needs to occur.
B
A user received an invalid password response when trying to change the password. Which of the following policies could
explain why the password is invalid?
C
A security analyst has discovered that an outbound SFTP process is occurring at the same time of day for the past several
days. At the time this was discovered, large amounts of business critical data were delivered. The authentication for this
process occurred using a service account with proper credentials. The security analyst investigated the destination IP for this
transfer and discovered that this new process is not documented in the change management log. Which of the following
would be the BEST course of action for the analyst to take?
A
A company invested ten percent of its entire annual budget in security technologies. The Chief Information Officer (CIO) is
convinced that, without this investment, the company will risk being the next victim of the same cyber attack its competitor
experienced three months ago. However, despite this investment, users are sharing their usernames and passwords with
their coworkers to get their jobs done. Which of the following will eliminate the risk introduced by this practice?
C