Question 151
The development team recently moved a new application into production for the accounting department.
After this occurred, the Chief Information Officer (CIO) was contacted by the head of accounting because
the application is missing a key piece of functionality that is needed to complete the corporation's quarterly
tax returns. Which of the following types of testing would help prevent this from reoccurring?
Question 152
Alerts have been received from the SIEM, indicating infections on multiple computers.
Based on threat characteristic, these files were quarantined by the host-based antivirus program. At the same time, additional alerts in the SIEM show multiple blocked URLs from the address of the infected computers; the URLs were clashed as uncategorized. The domain location of the IP address of the URLs that were blocked is checked, and it is registered to an ISP in Russia. Which of the following steps should be taken NEXT?
Question 153
A server contains baseline images that are deployed to sensitive workstations on a regular basis. The
images are evaluated once per month for patching and other fixes, but do not change otherwise. Which of
the following controls should be put in place to secure the file server and ensure the images are not
changed?
Question 154
During the forensic a phase of a security investigation, it was discovered that an attacker was able to find
private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt
sensitive traffic on a web server. Which of the following describes this type of exploit and the potential
remediation?
Question 155
Poky allows scanning of vulnerabilities during production hours. But production servers have been crashing later due lo unauthorized scans performed by junior technicians. Which of the following is the BEST solution to avoid production server downtime due to these types of scans?
