Which of the following would BEST meet the architect's objectives?
A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent,...
The administrator is given the following, requirements?
A network administrator has been asked to design a solution to improve a company's security posture. The administrator is given the following, requirements? • The solution must be inline in the network • The solution must be able to block known malicious traffic • The solution must be able to...
Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?
A security analyst has been reading about a newly discovered cyber attack from a known threat actor . Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?A . Security research publicationsB . The MITRE...
Which of the following BEST describes the type of attack that is occurring?
Given the following logs: Which of the following BEST describes the type of attack that is occurring?A . Rainbow tableB . DictionaryC . Password sprayingD . Pass-the-hashView AnswerAnswer: C
Which of the following cloud models would BEST meet the needs of the organization?
To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving . Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . laaSC . SaaSD...
Which of the following did the assessment identify?
A security assessment determines DES and 3DES at still being used on recently deployed production servers . Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D
Which erf the following attacks in happening on the corporate network?
A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...
Which of the following types of controls should be used to reduce the risk created by this scenario?
A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard . Which of the following types...
Which of the following attacks has occurred?
A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, while reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...
Which of the following technologies will the coffee shop MOST likely use in place of PSK?
A local coffee shop runs a small WiFi hot-spot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure . Which of the following technologies will the coffee shop MOST likely...