Which of the following would be BEST to help mitigate this concern?

A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to account to the account and pivot...

August 26, 2021 No Comments READ MORE +

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?A . An SLAB . AnNDAC . ABPAD . AnMOUView AnswerAnswer: D

August 25, 2021 No Comments READ MORE +

Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....

August 25, 2021 No Comments READ MORE +

Which of the following should be the administrator's NEXT step to detect if there is a rogue system without impacting availability?

While reviewing the wireless router, the systems administrator of a small business determines someone is spoofing the MAC address of an authorized device. Given the table below: Which of the following should be the administrator's NEXT step to detect if there is a rogue system without impacting availability?A . Conduct...

August 25, 2021 No Comments READ MORE +

Which of the following resiliency techniques was applied to the network to prevent this attack?

A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted. Which of the following resiliency techniques was applied to the network to prevent this attack?A . NIC TeamingB . Port mirroringC...

August 25, 2021 No Comments READ MORE +

Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

August 25, 2021 No Comments READ MORE +

Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

August 25, 2021 No Comments READ MORE +

Which of the following did the administrator MOST likely configure that will assist the investigators?

A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident. The systems administrator has Just informed investigators that other log files are available for review. Which of the following did the administrator...

August 25, 2021 No Comments READ MORE +

Which of the following is the attacker exploiting?

An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?A . Zero-dayB . Default permissionsC . Weak encryptionD . Unsecure root accountsView AnswerAnswer: A

August 25, 2021 No Comments READ MORE +

Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?

Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?A . TabletopB . ParallelC . Full interruptionD . SimulationView AnswerAnswer: D

August 25, 2021 No Comments READ MORE +