A cybersecurity expert assigned to be the IT manager of a middle-sized company discovers that there
is little endpoint security implementation on the company’s systems. Which of the following could
be included in an endpoint security solution? (Choose two.)
AB
During a security investigation, a suspicious Linux laptop is found in the server room. The laptop is
processing information and indicating network activity. The investigator is preparing to launch an
investigation to
determine what is happening with this laptop. Which of the following is the MOST appropriate set of
Linux commands that should be executed to conduct the investigation?
B
A security analyst is required to collect detailed network traffic on a virtual machine. Which of the
following tools could the analyst use?
D
After a security breach, a security consultant is hired to perform a vulnerability assessment for a
company’s web application. Which of the following tools would the consultant use?
A
Explanation:
Reference: https://www.scnsoft.com/blog/network-vulnerability-assessment-guide
When performing an investigation, a security analyst needs to extract information from text files in a
Windows operating system. Which of the following commands should the security analyst use?
C
Which of the following does the command nmap –open 10.10.10.3 do?
D
A web server is under a denial of service (DoS) attack. The administrator reviews logs and creates an
access control list (ACL) to stop the attack. Which of the following technologies could perform these
steps automatically in the future?
B
Explanation:
Reference: https://www.ciscopress.com/articles/article.asp?p=345618
An organization recently suffered a breach due to a human resources administrator emailing
employee names and Social Security numbers to a distribution list. Which of the following tools
would help mitigate this risk from recurring?
A
An incident responder was asked to analyze malicious traffic. Which of the following tools would be
BEST for this?
C
Explanation:
Reference: https://resources.infosecinstitute.com/category/certifications-training/network-traffic-
analysis-for- incident-response/threat-intelligence-collection-and-analysis/analyzing-fileless-
malware/#gref
A network administrator has determined that network performance has degraded due to excessive
use of
social media and Internet streaming services. Which of the following would be effective for limiting
access to these types of services, without completely restricting access to a site?
B
Explanation:
Reference: https://umbrella.cisco.com/solutions/web-content-filtering