Which of the following will the CISO MOST likely recommend to mitigate this risk?
A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operation in the event of a prolonged DDoS attack on its local datacenter that consumes database resources . Which of the following will the CISO MOST likely recommend to mitigate this risk?A . Upgrade the...
Which of the following is the attacker MOST likely attempting?
An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims . Which of the following is the attacker MOST likely attempting?A . A spear-phishing attackB . A watering-hole attackC . Typo squattingD . A phishing attackView AnswerAnswer:...
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?A . The data ownerB . The data processorC . The data stewardD . The data privacy officer.View AnswerAnswer: C
Which of the following BEST describes the configurations the attacker exploited?
An attacker was easily able to log in to a company's security camera by performing a basic online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?A . Weak encryptionB . Unsecure protocolsC . Default settingsD...
Which of the following would MOST likely have prevented this breach?
A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area . Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD ....
A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?
A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?A . highest to lowest sequence numberB . nonsequential orderC . deterministic orderD . lowest to highest sequence numberView...
A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?
A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?A . highest to lowest sequence numberB . nonsequential orderC . deterministic orderD . lowest to highest sequence numberView...
Which of the following should the analyst recommend be enabled?
An attacker is attempting, to harvest user credentials on a client's website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password. the logon screen displays the following message: Which of the following should the analyst recommend be enabled?A...
Which of the following controls should the company consider using as part of its IAM strategy?
A nationwide company is experiencing unauthorized logins at all hours of the day. The logins appear to originate from countries in which the company has no employees . Which of the following controls should the company consider using as part of its IAM strategy? (Select TWO).A . A complex password...
The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.
The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port. Instructions: The firewall will process the rules in a top-down manner in order as a first match. The port number must be typed in and only one port number can...