Which of the following is being used?

To further secure a company’s email system, an administrator is adding public keys to DNS records in the company’s domain. Which of the following is being used?A . PFSB . SPFC . DMARCD . DNSSECView AnswerAnswer: D

August 11, 2021 No Comments READ MORE +

Which of the following should the analyst disable to enhance the access point security?

Accompany deployed a WiFi access point in a public area and wants to harden the configuration to make it more secure. After performing an assessment, an analyst identifies that the access point is configured to use WPA3, AES, WPS, and RADIUS. Which of the following should the analyst disable to...

August 11, 2021 No Comments READ MORE +

Which of the following describes the ability of code to target a hypervisor from inside

Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B

August 11, 2021 No Comments READ MORE +

Which of the following BEST describes this kind of attack?

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server: Which of the following BEST describes this kind of attack?A . Directory traversalB . SQL injectionC . APID . Request forgeryView AnswerAnswer: D

July 24, 2021 No Comments READ MORE +

Which of the following should the analyst Include in this documentation?

A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst Include in this documentation? (Select TWO).A . The order of volatilityB . A checksumC . The location of the artifactsD . The vendor's nameE . The date and timeF ....

July 24, 2021 No Comments READ MORE +

A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers.

A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers. Prior to releasing specific threat intelligence to other paid subscribers, the organization is MOST likely obligated by contracts to:A . perform attribution to specific APTs and nation-state actors.B . anonymize any PII that is observed within the...

July 24, 2021 No Comments READ MORE +

When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....

July 24, 2021 No Comments READ MORE +

Which of the following BEST explains the appliance’s vulnerable state?

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments . Which of the following BEST explains the appliance’s vulnerable state?A . The system was configured with weak default security settings.B . The device uses weak encryption ciphers.C...

July 23, 2021 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment . Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed...

July 23, 2021 No Comments READ MORE +

Which of the following would BEST these requirement?

A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked . Which of the following would BEST these requirement?A . RAB . OCSPC...

July 23, 2021 No Comments READ MORE +