1. Which of the following is the MOST secure method to perform dynamic analysis of malware that can sense when it is in a virtual environment?
A) Place the malware on an isolated virtual server disconnected from the network.
B) Place the malware on a virtual server running SIFT and begin analysis.
C) Place the malware on a virtual server connected to a VLAN.
D) Place the malware in a virtual server that is running Windows and is connected to the network.
2. A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performingslowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which of thefollowing can be implemented to maintain the availability of the website?
A) MAC filtering
B) DMZ
C) Whitelisting
D) Honeypot
E) VPN
3. A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsoredauthentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?
A) The corporate network should have a wireless infrastructure that uses open authentication standards.
B) Guests using the wireless network should provide valid identification when registering their wireless devices.
C) The network should authenticate all guest users using 802.1x backed by a RADIUS or LDAP server.
D) Sponsored guest passwords must be at least ten characters in length and contain a symbol.
4. A vulnerability analyst needs to identify all systems with unauthorized web servers on the 10.1.1.0/24 network. The analyst uses the following default Nmap scan:nmap sV p 1-65535 10.1.1.0/24Which of the following would be the result of running the above command?
A) This scan checks all TCP ports and returns versions.
B) This scan checks all TCP ports.
C) This scan identifies unauthorized servers.
D) This scan probes all ports and returns open ones.
5. A recent vulnerability scan found four vulnerabilities on an organizations public Internet-facing IP addresses. Prioritizing in order to reduce the risk of a breach to theorganization, which of the following should be remediated FIRST?
A) An HTTP response that reveals an internal IP address.
B) A buffer overflow that allows remote code execution.
C) A website using a self-signed SSL certificate.
D) A cipher that is known to be cryptographically weak.