Taylor has been asked to harden several Linux servers within her organization. At a minimum, which of the following accounts should be secured with strong passwords and disallowed from logging in directly with SSH? a. Taylor b. Root c. Admin d. Administrator Frank is analyzing the logs on a server and sees a number of failed attempts using different user accounts. Upon further analysis, he sees that the same password is used for each of the accounts where access was attempted. Which of the following types of attacks has he just discovered on this server? a. Man-in-the-middle b. Session hijacking c. Credential stuffing d. Password spraying Georgios has just returned from a cybersecurity conference where he learned about the methodology that threat actors use to attack their victims or intended victims. Which of the following steps in this methodology are a primary reason why he may be concerned about what information employees share online? a. Weaponization b. Exploitation c. Delivery d. Reconnaissance
-
Taylor has been asked to harden several Linux servers within her organization. At a minimum, which of the following accounts should be secured with strong passwords and disallowed from logging in directly with SSH?
a. Taylor
b. Root
c. Admin
d. Administrator
-
Frank is analyzing the logs on a server and sees a number of failed attempts using different user accounts. Upon further analysis, he sees that the same password is used for each of the accounts where access was attempted. Which of the following types of attacks has he just discovered on this server?
a. Man-in-the-middle
b. Session hijacking
c. Credential stuffing
d. Password spraying
-
Georgios has just returned from a
cybersecurity conference where he learned about the methodology that threat actors use to attack their victims or intended victims. Which of the following steps in this methodology are a primary reason why he may be concerned about what information employees share online?
a. Weaponization
b. Exploitation
c. Delivery
d. Reconnaissance
Trending now
This is a popular solution!
Step by step
Solved in 2 steps