Which of the following biometrics will MOST likely be used, without the need for enrollment?

An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to...

February 23, 2022 No Comments READ MORE +

Which of the following files should be given to the forensics firm?

A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server . Which of the following files should be given to the forensics firm?A . SecurityB . ApplicationC . DumpD ....

February 23, 2022 No Comments READ MORE +

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?A . SaaSB . PaaSC . IaaSD . DaaSView AnswerAnswer: C

February 23, 2022 No Comments READ MORE +

Which of the following attacks is MOST likely being detected?

A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned . Which...

February 23, 2022 No Comments READ MORE +

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C

February 22, 2022 No Comments READ MORE +

Which of the following should the CISO read and understand before writing the policies?

A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing . Which of the following should the CISO read and understand before writing the policies?A . PCI DSSB . GDPRC . NISTD . ISO 31000View AnswerAnswer: B Explanation: GDPR...

February 22, 2022 No Comments READ MORE +

Based on the analyst’s findings, which of the following attacks is being executed?

A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: To better understand what is going on, the analyst runs a command and receives the following output:...

February 22, 2022 No Comments READ MORE +

Which of the following attacks does the analyst MOST likely see in this packet capture?

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output: Which of the following attacks does the...

February 22, 2022 No Comments READ MORE +

Which of the following recommendations would BEST prevent this from reoccurring?

A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set . Which of the following recommendations...

February 22, 2022 No Comments READ MORE +

Which of the following should the IT administrator do FIRST after recovery?

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again . Which of the following should the IT administrator...

February 22, 2022 No Comments READ MORE +