Which of the following would be the BEST resource for determining the order of priority?
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues . Which of the following would be the BEST resource for determining the order of priority?A . NmapnB ....
Which of the following types of attacks does this MOST likely represent?
A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?A . Rainbow tableB . Brute-forceC . Password-sprayingD . DictionaryView AnswerAnswer: C
Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?
Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?A . Data encryptionB . Data maskingC . AnonymizationD . TokenizationView AnswerAnswer: A
Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)
Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)A . Cross-site scriptingB . Data exfiltrationC . Poor system loggingD ....
Which of the following is the MOST likely cause of this issue?
A network engineer is troubleshooting wireless network connectivity issues that were reported by users. The issues are occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow speeds when accessing websites and are unable to connect to network drives. The...
Which of the following algorithms has the SMALLEST key size?
Which of the following algorithms has the SMALLEST key size?A . DESB . TwofishC . RSAD . AESView AnswerAnswer: B
Which of the following attacks was MOST likely used?
A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours . Which of the following attacks was MOST likely used?A...
Which of the following is the BEST defense against this scenario?
A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots . Which of the following is the BEST defense against this scenario?A . Configuring signature-based...
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B
Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?
Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?A . A right-to-audit clause allowing for annual security auditsB . Requirements for event logs to be kept for a minimum of 30 daysC . Integration of...