Which of the following types of service providers is being used?

A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO. from sending email from a work account to a personal account. Which of the following types of service providers is being used?A . Telecommunications service...

August 13, 2021 No Comments READ MORE +

Which of the following can be determined about the organization's public presence and security posture?

Joe. a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output: Which of the following can be determined about the organization's public presence and security posture? (Select TWO).A . Joe...

August 13, 2021 No Comments READ MORE +

Which of the following is the BEST defense against this scenario?

A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?A . Configuring signature-based antivirus...

August 13, 2021 No Comments READ MORE +

A security engineer is setting up passwordless authentication for the first time

DRAG DROP A security engineer is setting up passwordless authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation,...

August 13, 2021 No Comments READ MORE +

Which of the following attacks was successfully implemented based on the output?

A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output: Which of the following attacks was successfully implemented based on the output?A . Memory leakB . Race conditionsC . SQL injectionD . Directory...

August 12, 2021 No Comments READ MORE +

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrixB . Risk toleranceC . Risk registerD . Risk appetiteView AnswerAnswer: B

August 12, 2021 No Comments READ MORE +

Which of the following should administrator implement to protect the environment from this malware?

Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the...

August 12, 2021 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

August 12, 2021 No Comments READ MORE +

Which of the following should be implemented to prevent similar situations in the future?

Several large orders of merchandise were recently purchased on an e-commerce company's website. The totals for each of the transactions were negative values, resulting in credits on the customers' accounts. Which of the following should be implemented to prevent similar situations in the future?A . Ensure input validation is in...

August 12, 2021 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

August 11, 2021 No Comments READ MORE +