Which of the following would MOST likely have prevented this breach?

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD . BiometricsView...

April 7, 2022 No Comments READ MORE +

Which of the following should administrator implement to protect the environment from this malware?

Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the...

April 7, 2022 No Comments READ MORE +

Which of the following would MOST likely contain that information?

An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer: B

April 7, 2022 No Comments READ MORE +

Which of the following MOST likely occurred?

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site Upon investigation, a security analyst the identifies the following: • The legitimate websites IP address is 10.1.1.20 and eRecruit local resolves to the IP • The forged...

April 7, 2022 No Comments READ MORE +

Which of the following is the router experiencing?

A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?A . DDoS attackB...

April 7, 2022 No Comments READ MORE +

Which of the following BEST describes this process?

A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?A . Continuous deliveryB ....

April 7, 2022 No Comments READ MORE +

Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...

April 6, 2022 No Comments READ MORE +

Which of the following ISO standards is certified for privacy?

Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C Explanation: ISO 27701 also abbreviated as PIMS (Privacy Information Management System) outlines a framework for Personally Identifiable Information (PII) Controllers and PII Processors to manage data...

April 6, 2022 No Comments READ MORE +

Which of the following social-engineering techniques was used in this case?

A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?A . SPIMB . VishingC . Spear phishingD . SmishingView AnswerAnswer: D

April 6, 2022 No Comments READ MORE +

Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to...

April 6, 2022 No Comments READ MORE +