Which of the following access control schemes would be BEST for the company to implement?

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels . Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D

March 8, 2022 No Comments READ MORE +

Which of the following should the administrator use when configuring the VPN?

A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions. Which of the following should the administrator use when configuring the VPN?A . AHB . EDRC . ESPD . DNSSECView AnswerAnswer:...

March 8, 2022 No Comments READ MORE +

Which of the following would mitigate the damage done by this type of data exfiltration in the future?

A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text . Which of the following would mitigate the damage done by this type of data exfiltration in the future?A . Create DLP controls that...

March 8, 2022 No Comments READ MORE +

Which of the following should the administrator use?

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk . Which of the following should the administrator use?A . ddB . chmodC . dnsenumD . loggerView AnswerAnswer: A

March 8, 2022 No Comments READ MORE +

Which of the following certificate types would BEST meet the requirements?

A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are: ✑ www.company.com (main website) ✑ contactus.company.com (for locating a nearby location) ✑ quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing...

March 8, 2022 No Comments READ MORE +

In which of the following situations would it be BEST to use a detective control type for mitigation?

In which of the following situations would it be BEST to use a detective control type for mitigation?A . A company implemented a network load balancer to ensure 99.999% availability of its web application.B . A company designed a backup solution to increase the chances of restoring services in case...

March 8, 2022 No Comments READ MORE +

In which of the following incident response phases is the security engineer currently operating?

In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?A . IdentificationB . PreparationC . EradictionD . RecoveryE . ContainmentView AnswerAnswer: E

March 8, 2022 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

March 8, 2022 No Comments READ MORE +

Which of the following describes the BEST approach for deploying application patches?

Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...

March 7, 2022 No Comments READ MORE +

Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code . Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD...

March 7, 2022 No Comments READ MORE +