Which of the following technologies are being utilized to provide these capabilities?
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies...
Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...
Which of the following should the administrator configure?
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?A . A captive portalB . PSKC . 802.1XD . WPSView AnswerAnswer: C
Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?
A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be...
Which of the following is the analyst doing?
A security analyst is using a recently released security advisory to review historical logs, looking for the specific activity that was outlined in the advisory. Which of the following is the analyst doing?A . A packet captureB . A user behavior analysisC . Threat huntingD . Credentialed vulnerability scanningView AnswerAnswer:...
Which of the following attacks does the analyst MOST likely see in this packet capture?
A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output: Which of the following attacks does the...
Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?
A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?A . SIEMB . DLPC . CASBD . SWGView AnswerAnswer: C
As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?A . Order of volatilityB . Data recoveryC . Chain of custodyD . Non-repudiationView AnswerAnswer: C
Which of the following would BEST assist the company?
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B
A security engineer is setting up password less authentication for the first time
DRAG DROP A security engineer is setting up password less authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the...