Which of the following demonstrates what the administrator is providing?

After entering a username and password, and administrator must gesture on a touch screen. Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D

April 10, 2022 No Comments READ MORE +

Which of the following can the security analyst conclude?

A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log: Which of the following can the security analyst conclude?A . A replay attack is being...

April 10, 2022 No Comments READ MORE +

Which of the following BEST describes the type of attack the analyst is experience?

During an incident response, a security analyst observes the following log entry on the web server. Which of the following BEST describes the type of attack the analyst is experience?A . SQL injectionB . Cross-site scriptingC . Pass-the-hashD . Directory traversalView AnswerAnswer: D

April 10, 2022 1 Comment READ MORE +

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)A . Data accessibilityB . Legal holdC . Cryptographic or hash algorithmD . Data retention legislationE . Value and volatility of dataF . Right-to-audit clausesView AnswerAnswer: E,F

April 10, 2022 No Comments READ MORE +

Which of the following would MOST likely show where the malware originated?

A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?A . The DNS logsB . The...

April 10, 2022 No Comments READ MORE +

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A

April 9, 2022 No Comments READ MORE +

Which of the following solutions would BEST support the policy?

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A

April 9, 2022 No Comments READ MORE +

Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)

Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)A . AlarmsB . SignageC . LightingD . MantrapsE . FencingF . SensorsView AnswerAnswer: D,E

April 9, 2022 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...

April 9, 2022 No Comments READ MORE +

Which of the following would be BEST to address the ClO’s concerns?

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....

April 9, 2022 No Comments READ MORE +