The most recent vulnerability scan flagged the domain controller with a critical vulnerability. The systems administrator researched the vulnerability and discovered the domain controller
does not run the associated application with the vulnerability. Which of the following steps should the administrator take next?
A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would most likely have prevented this breach?
Which of the following test helps to demonstrate integrity during a forensics investigation?
A security analyst is reviewing the output of a web server log and notices a particular account is attempting to transfer large amounts of money:
GET 6959 &amount=500000 HTTP/1.1
GET &amount=5000000 HTTP/1.1
GET &amount=1000000 HTTP/1.1
GET &amount=500 HTTP/1.1
Which of the following types of attacks is most likely being conducted?