Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems . Which of the following actions will BEST allow the PII to...

July 11, 2021 No Comments READ MORE +

Which of the following would BEST meet this objective?

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime . Which of the following would BEST meet this objective? (Choose two.)A . Dual power supplyB . Off-site backupsC . Automatic OS upgradesD . NIC teamingE . Scheduled penetration testingF . Network-attached storageView...

July 11, 2021 No Comments READ MORE +

Which of the following RAID levels meets this requirements?

A critical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity and handle two simultaneous disk failures . Which of the following RAID levels meets this requirements?A . RAID 0+1B . RAID 2C . RAID 5D ....

July 10, 2021 No Comments READ MORE +

Which of the following describes the method that was used to compromise the laptop?

A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log: Which of the following describes the method that was used to compromise the laptop?A . An attacker was able to move laterally from...

July 10, 2021 No Comments READ MORE +

Which of the following should the analyst implement to authenticate the entire packet?

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet . Which of the following should the analyst implement to authenticate the entire packet?A . AHB . ESPC . SRTPD . LDAPView AnswerAnswer: B

July 10, 2021 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

July 10, 2021 No Comments READ MORE +

Which of the following would be BEST to help the organization’s executives determine the next course of action?

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine the next course of action?A . An incident response planB . A communications planC . A disaster recovery planD...

June 7, 2021 No Comments READ MORE +

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C

June 7, 2021 No Comments READ MORE +

From which of the following did the alert MOST likely originate?

A security analyst has received an alert about being sent via email. The analyst’s Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care. From which of the following did the alert MOST likely originate?A . S/MIMEB . DLPC . IMAPD . HIDSView...

June 7, 2021 No Comments READ MORE +

Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

June 7, 2021 No Comments READ MORE +