Uncategorized

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Gary is conducting an incident investigation and would like to detect attempts to connect to a server over an RDP connection. What logs would be least likely to contain this information? A. System Logs B. Security Logs C. Netflow Logs D. Database Logs Correct Answer: D Gary may find relevant information in the system and security logs because the login attempts would likely be tracked by the operating system in those locations. Netflow records may also contain details of the traffic flow to the server. There is no database involved in an RDP connection, so database logs are not likely to contain useful information.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Josh is reviewing and updating the firewall rules used by his organization to react to changing needs. What type of control primarily describes the network firewall? A. Detective B. Deterrent C. Corrective D. Preventive Correct Answer: D While it is possible to make an argument that the network firewall fits into all of these categories, a firewall's primary purpose is to block unwanted traffic from entering the network. Therefore, it is best described as a preventative control. Detective controls are designed to identify malicious activity that occurs. Corrective controls are designed to restore normal service after a security incident. Deterrent controls are designed to discourage a potential attacker from attempting an attack. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Marty is the web administrator for the Memphis Belle Casino. He hosts the company's website at memphisbelle.com. He recently discovered that a competitor registered the domain names memphisbell.com, memphisbellecasino.com, and thememphisbelle.com. What type of attack has taken place? A. DNS Poisoning B. Typosquatting C. DNS Hijacking D. Domain Hijacking Correct Answer: B The attacker is not altering any of Marty's DNS records, so this is not a DNS hijacking or poisoning attack. They are also not stealing a domain that Marty already registered so it is not a domain hijacking attack.This is an example of a typosquatting attack, where the attacker registers domain names that are common typos of a legitimate domain. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...