Which of the following describes what the manager is doing?

A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the...

April 24, 2022 No Comments READ MORE +

Which of the following attacks is MOST likely being detected?

A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned . Which...

April 23, 2022 No Comments READ MORE +

Which of the following techniques BEST explains this action?

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string . Which of the following techniques BEST explains this action?A . PredictabilityB . Key stretchingC . SaltingD . HashingView AnswerAnswer: C

April 23, 2022 No Comments READ MORE +

Which of the following would MOST likely contain that information?

An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button . Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer:...

April 23, 2022 No Comments READ MORE +

Which of the following methods would BEST accomplish this goal?

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process . Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB...

April 23, 2022 1 Comment READ MORE +

Which of the following ISO standards is certified for privacy?

Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C Explanation: ISO 27701 also abbreviated as PIMS (Privacy Information Management System) outlines a framework for Personally Identifiable Information (PII) Controllers and PII Processors to manage data...

April 23, 2022 No Comments READ MORE +

Which of the following demonstrates what the administrator is providing?

After entering a username and password, and administrator must gesture on a touch screen . Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D

April 23, 2022 No Comments READ MORE +

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . Included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer: D,E

April 23, 2022 1 Comment READ MORE +

Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred . Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD ....

April 23, 2022 No Comments READ MORE +

Which of the following would be BEST to address the ClO’s concerns?

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....

April 23, 2022 No Comments READ MORE +