Which of the following scan types would produce the BEST vulnerability scan report?
A security analyst needs to perform periodic vulnerably scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?A . PortB . IntrusiveC . Host discoveryD . CredentialedView AnswerAnswer: D
Which of the following services would BEST meet the criteria?
An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?A . TLSB . PFSC . ESPD . AHView AnswerAnswer: A
Which erf the following attacks in happening on the corporate network?
A security administrator is analyzing the corporate wireless network The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...
Which of the following are the BEST options to accomplish this objective'?
An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select...
Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?
A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?A . PCI...
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation
HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...
Which of the following recommendations would BEST prevent this from reoccurring?
A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would...
Which of the following demonstrates what the administrator is providing?
After entering a username and password, and administrator must gesture on a touch screen. Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D
Which of the following BEST represents the type of testing that will occur?
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?A . Bug bountyB . Black-boxC...
Which of the following steps would be best for the security engineer to take NEXT?
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output: Which of the following steps would be best for the security engineer...