Which of the following BEST describes what the company should purchase to ensure its critical servers and network devices stay online?

A company has been experiencing very brief power outages from its utility company over the last few months. These outages only last for one second each time. The utility company is aware of the issue and is working to replace a faulty transformer. Which of the following BEST describes what...

August 24, 2021 No Comments READ MORE +

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . Included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer: A,D

August 24, 2021 No Comments READ MORE +

Which of the following biometrics will MOST likely be used, without the need for enrollment?

An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to...

August 24, 2021 No Comments READ MORE +

Which of the following BEST describes the tasks the developer is conducting?

A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A

August 24, 2021 1 Comment READ MORE +

Which of the following will the CISO MOST likely recommend to mitigate this risk?

A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operation in the event of a prolonged DDoS attack on its local datacenter that consumes database resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?A . Upgrade the bandwidth...

August 24, 2021 1 Comment READ MORE +

In which of the following incident response phases is the security engineer currently operating?

In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?A . IdentificationB . PreparationC . EradictionD . RecoveryE . ContainmentView AnswerAnswer: E

August 24, 2021 No Comments READ MORE +

Which of the following technologies will accomplish this objective?

A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?A . Security information and event managementB . A web application firewallC . A vulnerability scannerD . A next-generation firewallView AnswerAnswer: A

August 23, 2021 No Comments READ MORE +

Which of the following technologies will the coffee shop MOST likely use in place of PSK?

A local coffee shop runs a small WiFi hot-spot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure. Which of the following technologies will the coffee shop MOST likely use...

August 23, 2021 1 Comment READ MORE +

Which of the following types of attacks has occurred?

After a phishing scam for a user's credentials, the red team was able to craft a payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which of the following types of attacks has occurred?A . Privilege escalationB . Session...

August 23, 2021 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

August 23, 2021 No Comments READ MORE +