Which of the following would be BEST for the security manager to use in a threat mode?

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company’s Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks. Which of the following would be BEST for the security manager to use...

July 21, 2021 No Comments READ MORE +

Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague . Which of the following is the FIRST step the senior colleague will most...

July 20, 2021 No Comments READ MORE +

Which of the following would be BEST to use to accomplish the task?

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for...

July 20, 2021 No Comments READ MORE +

Which of the following techniques BEST explains this action?

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string . Which of the following techniques BEST explains this action?A . PredictabilityB . Key stretchingC . SaltingD . HashingView AnswerAnswer: C

July 20, 2021 No Comments READ MORE +

Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?

A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO) . Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code...

July 20, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

An end user reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user's email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user's computer...

July 19, 2021 No Comments READ MORE +

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team . Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC...

July 19, 2021 No Comments READ MORE +

Which of the fallowing should be deployed to detect a potential insider threat?

A500 is implementing an insider threat detection program. The primary concern is that users may be accessing confidential data without authorization . Which of the fallowing should be deployed to detect a potential insider threat?A . A honeyfileB . A DMZC . ULFD . File integrity monitoringView AnswerAnswer: A

July 19, 2021 No Comments READ MORE +

Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred . Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD ....

July 18, 2021 No Comments READ MORE +

Which of the following would a European company interested in implementing a technical, hands-on set of security standards MOST likely choose?

Which of the following would a European company interested in implementing a technical, hands-on set of security standards MOST likely choose?A . GOPRB . CIS controlsC . ISO 27001D . ISO 37000View AnswerAnswer: A

July 18, 2021 No Comments READ MORE +