Question

REALISTIC ANSWERS PLS QUESTION: 166 A company contracts a security engineer to perform a penetration test...

REALISTIC ANSWERS PLS

QUESTION: 166

A company contracts a security engineer to perform a penetration test of its client-facing web portal.

Which of the following activities would be MOST appropriate?

A. Use a protocol analyzer against the site to see if data input can be replayed from the browser

B. Scan the website through an interception proxy and identify areas for the code injection

C. Scan the site with a port scanner to identify vulnerable services running on the web server

D. Use network enumeration tools to identify if the server is running behind a load balancer

QUESTION: 167

A large enterprise with thousands of users is experiencing a relatively high frequency of malicious activity from the insider threats. Much of the activity appears to involve internal reconnaissance that results in targeted attacks against privileged users and network file shares. Given this scenario, which of the following would MOST likely prevent or deter these attacks? (Choose two.)

A. Conduct role-based training for privileged users that highlights common threats against them and covers best practices to thwart attacks

B. Increase the frequency at which host operating systems are scanned for vulnerabilities, and

decrease the amount of time permitted between vulnerability identification and the application of

corresponding patches

C. Enforce command shell restrictions via group policies for all workstations by default to limit which native operating system tools are available for use

D. Modify the existing rules of behavior to include an explicit statement prohibiting users from

enumerating user and file directories using available tools and/or accessing visible resources that do not directly pertain to their job functions

E. For all workstations, implement full-disk encryption and configure UEFI instances to require

complex passwords for authentication

F. Implement application blacklisting enforced by the operating systems of all machines in the

Enterprise

0 0
Add a comment Improve this question Transcribed image text
Answer #1

166. Correct Answer: C. Scan the site with a port scanner to identify vulnerable services running on a web server.

Explanation:

A- Protocol scanning is used to capture and analyze data traffic over a communication channel or bus. It allows to gain insight into the USB, I2C, CAN, etc.

B- Interception proxy are tools to analyze, view and modify HTTP requests and responses between a client and server. This is a type of middle-man attack, which will not give vulnerabilities.

C- Port scanner examines a server of host for active ports through which known vulnerabilities can be exploited. Such methods are used for discovering exploitable channels to prevent attacks.

D- Network Enumeration tools are used to gather information about a network along with other related data and offers better view of the network for either protection or exploitation purposes.

167. Correct Answer:

C. Enforce command shell restrictions via group policies for all workstations by default to limit which native operating system tools are available for use

D. Modify the existing rules of behavior to include an explicit statement prohibiting users from enumerating user and file directories using available tools and/or accessing visible resources that do not directly pertain to their job functions

Explanation:

A- A privileged user is someone who has the authority to access or modify company's network and data. Conducting a role-based training will only ensure that these users keep the best practices in mind to prevent attacks.

B- Vulnerability scanning will inspect for the potential points of exploit on a network to identify security loop-holes, and predict for an effective countermeasure. Increasing the frequency of these scans and patching will be less relevant, as the attack is against user-authentication.

C & D- Restricting access and Modifying existing rules of behavior, is a quick way to ensure that the users do not go around modifying/ accessing areas they shouldn't be accessing.

E- Full-disk encryption is basically using an encryption system to convert the entire information on a disk to unreadable code that can only be decrypted by someone with the secret key.

F- Application blacklisting will simply prevent end-users from executing undesirable programs.

Add a comment
Know the answer?
Add Answer to:
REALISTIC ANSWERS PLS QUESTION: 166 A company contracts a security engineer to perform a penetration test...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • REALISTIC ANSWERS PLS QUESTION: 180 A network engineer is attempting to design-in resiliency characteristics for an...

    REALISTIC ANSWERS PLS QUESTION: 180 A network engineer is attempting to design-in resiliency characteristics for an enterprise network’s VPN services. If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective? A. Implement a reverse proxy for VPN traffic that is defended and monitored by the organization’s SOC with near-real-time alerting to administrators. B. Subscribe to a managed service provider capable of supporting the...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT