Which of the following refers to applications and systems that are used within an organization without consent or approval?

Which of the following refers to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A

February 27, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly . Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer:...

February 26, 2022 No Comments READ MORE +

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A

February 26, 2022 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment . Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed...

February 26, 2022 No Comments READ MORE +

Which of the following would be BEST to address the ClO’s concerns?

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....

February 26, 2022 No Comments READ MORE +

Which of the following methods would BEST accomplish this goal?

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process . Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB...

February 26, 2022 No Comments READ MORE +

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team . Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC...

February 26, 2022 No Comments READ MORE +

Which of the following is MOST likely occurring?

While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on...

February 26, 2022 No Comments READ MORE +

Which of the following would be BEST to solve this issue?

A network engineer notices the VPN concentrator overloaded and crashes on days when there are a lot of remote workers. Senior management has placed greater importance on the availability of VPN resources for the remote workers than the security of the end users’ traffic . Which of the following would...

February 25, 2022 No Comments READ MORE +

Which of the following would be the BEST way to achieve this objective?

A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords . Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C

February 25, 2022 No Comments READ MORE +