Your enterprise SIEM system is configured to collect andanalyze log data from various sources. Beginning at12:00 AM on December 4, 2024, until 1:00 AM(Absolute), several instances of PowerShell arediscovered executing malicious commands andaccessing systems outside of their normal workinghours.
What is the physical address of the web server that wastargeted with malicious PowerShell commands?
Which of the following is theMOSTimportant component oftheasset decommissioning process from a data risk perspective?
A penetration tester has been hired and given access to all code, diagrams,and documentation. Which type oftesting is being conducted?
An organization's hosted database environment is encrypted by the vendor at rest and in transit. The database was accessed, and critical data was stolen. Which of the following is the MOST likely cause?
Which of the following is a KEY difference between traditional deployment methods and continuous integration/continuous deployment (CI/CD)?
An attacker has compromised a number of systems on an organization'snetwork andisexfiltrationdata Usingthe Domain Name System (DNS) queries. Whichof the following is the BEST mitigation strategy to prevent data exfiltration using this technique?
mitigation strategy to prevent data exfiltration using this technique?
Which type of cloud deployment model is intended to be leveraged over the Internet by many organizations with varying needs and requirements?
An attacker has exploited an e-commerce website by injecting arbitrary syntax that was passed to and executed by the underlying operating system. Which of the following tactics did the attacker MOST likely use?
Which of the following is the PRIMARY reason for tracking the effectiveness of vulnerability remediation processes within an organization?
Exposing the session identifier in a URL is an example of which web application-specific risk?