Userlogocredential t regdword d 1 d reg add

  • No School
  • AA 1
  • 2019freedumps
  • 20
  • 100% (4) 4 out of 4 people found this document helpful

This preview shows page 17 - 19 out of 20 pages.

userLogoCredential /t REG_DWORD /d 1D. reg add HKLM\System\CurrentControlSet\Control\SecurityProviders\WDigest /vuserLogoCredential /t REG_DWORD /d 1Answer: A
15.In which of the following components is an exploited vulnerability MOST likely toaffect multiple running application containers at once?
16.Which of the following would be BEST for performing passive reconnaissance on atarget's external domain?
17.If a security consultant comes across a password hash that resembles thefollowing b117 525b3454 7Oc29ca3dBaeOb556ba8Which of the following formats is the correct hash type?
18.A penetration tester was able to retrieve the initial VPN user domain credentials byphishing a member of the IT department. Afterward, the penetration tester obtainedhashes over the VPN and easily cracked them using a dictionary attack.Which of the following remediation steps should be recommended? (Select THREE)17 / 20
A. Mandate all employees take security awareness trainingB. Implement two-factor authentication for remote accessC. Install an intrusion prevention systemD. Increase password complexity requirementsE. Install a security information event monitoring solution.F. Prevent members of the IT department from interactively logging in asadministratorsG. Upgrade the cipher suite used for the VPN solutionAnswer: A,B,D
19.A software development team recently migrated to new application software on theon-premises environment Penetration test findings show that multiple vulnerabilitiesexist If a penetration tester does not have access to a live or test environment, a testmight be better to create the same environment on the VM.Which of the following is MOST important for confirmation?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture