Question

An analyst is preparing for a technical security compliance check on all Apache servers. Which of...

An analyst is preparing for a technical security compliance check on all Apache servers. Which of the following will be the BEST to use? (choose one and why)

A.CIS benchmark

B. Nagios
C. OWASP
D. Untidy

E. Cain&Abel

0 0
Add a comment Improve this question Transcribed image text
Answer #1

OWASP = Open Web Application Security Project.

It is an international organisation that provides network security services along with documentation, tools and help through seminars. OWASP produces an awareness document on yeary basis. The document is OWASP's top 10. This document lists top security threats for that year and provides with adequate solutions for those problems.

Add a comment
Know the answer?
Add Answer to:
An analyst is preparing for a technical security compliance check on all Apache servers. Which of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • A security analyst discovers a network intrusion and quickly solves the problem by closing an unused...

    A security analyst discovers a network intrusion and quickly solves the problem by closing an unused port. Which of the following should be completed? (choose one and why) A. Vulnerability report B. Memorandum of agreement C. Reverse-engineering incident report D. Lessons learned report

  • Malicious users utilized brute force to access a system. A cyber security analyst is investigating these...

    Malicious users utilized brute force to access a system. A cyber security analyst is investigating these attacks and recommends methods to management that would help secure the system. Which of the following controls should the analyst recommend? (Choose three.) A. Multifactor authentication B. Network segmentation C. Single sign-on D. Encryption E. Complexity policy F. Biometrics G. Obfuscation --------------------------------------------------------------------------------------------------------- A cyber security analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions....

  • A cyber security analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does...

    A cyber security analyst finds that unpatched servers have undetected vulnerabilities because the vulnerability scanner does not have the latest set of signatures. Management directed the security team to have personnel update the scanners with the latest signatures at least 24 hours before conducting any scans, but the outcome is unchanged. Which of the following is the BEST logical control to address the failure? A. Manually validate that the existing update is being performed. B. Configure a script to automatically...

  • Which type of security safeguard is human dependent? Key attributes of an EHR are: Select one:...

    Which type of security safeguard is human dependent? Key attributes of an EHR are: Select one: Oa. Accessibility via secure servers O b. Fast patient billing Select one a. Administrators and manuals b. Physical c. Technical d. All of the above O O c.Almost instant information retrieval. O d. A and C are correct.. Health Level 7 (HL-7) sèts standards for all of the following e ment structure related to patient medical reco Who is liable related to legal issues...

  • Which of the following is not a motivation to manipulate earnings? A. Remain in compliance with...

    Which of the following is not a motivation to manipulate earnings? A. Remain in compliance with debt covenants. B. Meet analyst expectation. C. Reduce tax obligation. D. All of the above.

  • During a table top exercise, it is determined that a security analyst is required to ensure...

    During a table top exercise, it is determined that a security analyst is required to ensure patching and scan reports are available during an incident, as well as documentation of all critical systems. To which of the following stakeholders should the analyst provide the reports? A Management B Affected Vendors C Security Operations D Legal

  • The help desk informed a security analyst of a trend that is beginning to develop regarding...

    The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files: Locky.js xerty.ini xerty.lib Further analysis indicates that when the zip file is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company...

  • While reviewing web server logs, a security analyst notices the following code: Which of the following...

    While reviewing web server logs, a security analyst notices the following code: Which of the following would prevent this code from performing malicious actions? (choose one and why) Performing web application penetration testing Requiring the application to use input validation Disabling the use of HTTP and requiring the use of HTTPS Installing a network firewall in front of the application GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org

  • Which of the following statements about columns in Apache Cassandra is TRUE? Select one: a. Related...

    Which of the following statements about columns in Apache Cassandra is TRUE? Select one: a. Related columns are stored in the same row b. Columns have a name, a value, and a timestamp c. Rows in a column family can contain different numbers of columns d. All of the above statements about columns in Apache Cassandra are true

  • A security analyst identified an sql injection attack. Which of the following is the first step...

    A security analyst identified an sql injection attack. Which of the following is the first step in remediating the vulnerability? A. implement stored procedures B. implement proper error handling C. implement input validations D. implements a WAF. Please explain. The only two options in my mind are A and C.

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT