Which of the following network attacks is the researcher MOST likely experiencing?

A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message: Which of the following...

April 22, 2022 No Comments READ MORE +

A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST...

April 22, 2022 No Comments READ MORE +

Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP . Which of the following mitigations would...

April 22, 2022 No Comments READ MORE +

Which of the following refers to applications and systems that are used within an organization without consent or approval?

Which of the following refers to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A

April 22, 2022 No Comments READ MORE +

Which of the following would MOST likely have prevented this breach?

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area . Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD ....

April 22, 2022 No Comments READ MORE +

Which of the following describes the ability of code to target a hypervisor from inside

Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B Explanation: Virtual machine escape is an exploit in which the attacker runs code on a VM that allows...

April 22, 2022 No Comments READ MORE +

An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes.

An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes. Which of the following is the 60-minute expectation an example of:A...

April 22, 2022 No Comments READ MORE +

Which of the following would BEST prevent this attack from reoccurring?

A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom . Which of the following would BEST prevent this attack from reoccurring?A . Configure the perimeter firewall to deny inbound external connections to...

April 22, 2022 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems . Which of the following actions will BEST allow the PII to...

April 21, 2022 No Comments READ MORE +

Which of the following would be BEST to help the organization’s executives determine the next course of action?

A global pandemic is forcing a private organization to close some business units and reduce staffing at others . Which of the following would be BEST to help the organization’s executives determine the next course of action?A . An incident response planB . A communications planC . A disaster recovery...

April 21, 2022 No Comments READ MORE +