Executive management approved the storage of sensitive data on smartphones and tablets as long as they were encrypted. Later a vulnerability was announced at an information security conference that allowed attackers to bypass the device??s authentication process, making the data accessible. The smartphone manufacturer said it would take six months for the vulnerability to be fixed and distributed through the cellular carriers. Four months after the vulnerability was announced, an employee lost his tablet and the sensitive information became public.
What was the failure that led to the information being lost?
Correct Answer:A
If an attacker wanted to dump hashes or run wmic commands on a target machine, which of the following tools would he use?
Correct Answer:C
Review the below results of an audit on a server. Based on these results, which document would you recommend be reviewed for training or updates?
Correct Answer:D
An administrator looking at a web application??s log file found login attempts by the same host over several seconds. Each user ID was attempted with three different passwords. The event took place over 5 seconds.
✑ ROOT
✑ TEST
✑ ADMIN
✑ SQL
✑ USER
✑ NAGIOSGUEST
What is the most likely source of this event?
Correct Answer:C
An organization wants to test its procedure for data recovery. Which of the following will be most effective?
Correct Answer:A