A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?
A system administrator identifies unusual network traffic from outside the local network. Which of the following is the BEST method for mitigating the threat?
Which of the following technologies would reduce the risk of a successful SQL injection attack?
An incident responder has collected network capture logs in a text file, separated by five or more data fields. Which of the following is the BEST command to use if the responder would like to print the file (to terminal/screen) in numerical order?
Which of the following characteristics of a web proxy strengthens cybersecurity? (Choose two.)