- (Exam Topic 1)
Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities After further investigation, a security analyst notices the following
• All users share workstations throughout the day
• Endpoint protection was disabled on several workstations throughout the network.
• Travel times on logins from the affected users are impossible
• Sensitive data is being uploaded to external sites
• All usee account passwords were forced lo be reset and the issue continued Which of the following attacks is being used to compromise the user accounts?
Correct Answer:
C
- (Exam Topic 4)
An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139. Which of the following sources should the analyst review to BEST ascertain how the incident could have been prevented?
Correct Answer:
A
- (Exam Topic 6)
Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?
Correct Answer:
B
- (Exam Topic 4)
An enterprise to keep cryptpgraphic keys in a sade manner.Whihc of the fikkowug network appliances can achieve this goals?
Correct Answer:
A
- (Exam Topic 6)
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?
Correct Answer:
D