As part of the image process, which of the following is the FIRST step the analyst should take?

A large number of emails have been reported, and a security analyst is reviewing the following information from the emails: As part of the image process, which of the following is the FIRST step the analyst should take?A . Block the email address carl b@comptia1 com, as it is sending...

September 9, 2022 No Comments READ MORE +

Which of the following should be created to prevent this type of issue in the future?

Due to adverse events, a medium-sized corporation suffered a major operational disruption that caused its servers to crash and experience a major power outage . Which of the following should be created to prevent this type of issue in the future?A . SLAB . BIAC . BCMD . BCPE ....

September 9, 2022 No Comments READ MORE +

Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?

A security analyst is reviewing the following vulnerability assessment report: Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?A . Server1B . Server2C . Server 3D . ServersView AnswerAnswer: A

September 9, 2022 No Comments READ MORE +

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. Which of...

September 9, 2022 No Comments READ MORE +

Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources. Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?A...

September 8, 2022 No Comments READ MORE +

Which of the must occur to ensure the integrity of the image?

Immediately following the report of a potential breach, a security engineer creates a forensic image of the server in question as part of the organization incident response procedure . Which of the must occur to ensure the integrity of the image?A . The image must be password protected against changes.B...

September 8, 2022 No Comments READ MORE +

Which of the following is the BEST solution?

A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have...

September 7, 2022 No Comments READ MORE +

Which of the following processes would BEST satisfy this requirement?

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The...

September 7, 2022 No Comments READ MORE +

Which of the following should be modified to prevent the issue from reoccurring?

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring?A . Recovery point objectiveB . Recovery time objectiveC...

September 7, 2022 No Comments READ MORE +

Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?

Which of the following represents the MOST significant benefit of implementing a passwordless authentication solution?A . Biometric authenticators are immutable.B . The likelihood of account compromise is reduced.C . Zero trust is achieved.D . Privacy risks are minimized.View AnswerAnswer: B Explanation: Reference: https://cloudworks.no/en/5-benefits-of-passwordless-authentication/

September 7, 2022 No Comments READ MORE +