Which of the following is MOST likely the problem?

A security engineer is troubleshooting an issue in which an employee is getting an IP address in the range on the wired network. The engineer plus another PC into the same port, and that PC gets an IP address in the correct range. The engineer then puts the employee’ PC...

September 10, 2022 No Comments READ MORE +

Which of the following sources could the architect consult to address this security concern?

A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks. Which of the following sources could...

September 10, 2022 No Comments READ MORE +

Which of the following systems should the consultant review before making a recommendation?

A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility. Which of the following systems should the consultant review before making a recommendation?A . CANB . ASICC . FPGAD . SCADAView AnswerAnswer: D Explanation: Reference:...

September 10, 2022 No Comments READ MORE +

Which of the following is the MOST cost-effective solution?

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to...

September 10, 2022 No Comments READ MORE +

Which of the following should the organization perform NEXT?

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact. Which of the following should the organization perform NEXT?A...

September 10, 2022 No Comments READ MORE +

Which of the following be the FIRST step taken by the team?

A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative, the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be...

September 10, 2022 No Comments READ MORE +

Which of the following techniques would BEST support this?

A penetration tester obtained root access on a Windows server and, according to the rules of engagement, is permitted to perform post-exploitation for persistence. Which of the following techniques would BEST support this?A . Configuring systemd services to run automatically at startupB . Creating a backdoorC . Exploiting an arbitrary...

September 10, 2022 No Comments READ MORE +

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in...

September 10, 2022 No Comments READ MORE +

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

Device event logs sources from MDM software as follows: Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?A . Malicious installation of an application; change the MDM configuration to remove application ID 1220.B . Resource leak; recover the...

September 10, 2022 No Comments READ MORE +

Which of the following would mitigate the department’s concerns?

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be: Leaked to the...

September 10, 2022 No Comments READ MORE +