A security administrator observed the following in a web server log while investigating an incident:
Which of the following attacks did the security administrator most likely see?
A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?
A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?
A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?
While reviewing logs, a security administrator identifies the following code:
<script>function(send_info)</script>
Which of the following best describes the vulnerability being exploited?
Which of the following is the best way to secure an on-site data center against intrusion from an insider?
An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?
A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?