Which of the following describes the ability of code to target a hypervisor from inside

Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B

June 7, 2021 No Comments READ MORE +

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?A . Data encryptionB . Data maskingC . AnonymizationD . TokenizationView AnswerAnswer: A

June 7, 2021 No Comments READ MORE +

Which of the following attack vectors was MOST likely used in this scenario?

A user contacts the help desk to report the following: ✑ Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested. ✑ The user was...

June 7, 2021 1 Comment READ MORE +

Which of the following methods would BEST prevent the exfiltration of data?

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).A . VPNB . Drive encryptionC . Network firewallD . File level encryptionE . USB blockerF . MFAView...

June 7, 2021 No Comments READ MORE +

Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...

June 6, 2021 No Comments READ MORE +

Which of the following is MOST likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?

Which of the following is MOST likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?A . An RTO reportB...

June 6, 2021 No Comments READ MORE +

Which of the following can the security analyst conclude?

A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. The security...

June 6, 2021 No Comments READ MORE +

Which of the following types of attack is MOST likely being conducted?

A security analyst is reviewing the output of a web server log and notices a particular account is attempting to transfer large amounts of money: Which of the following types of attack is MOST likely being conducted?A . SQLiB . CSRFC . Session replayD . APIView AnswerAnswer: C

June 6, 2021 No Comments READ MORE +

Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD ....

June 5, 2021 2 Comments READ MORE +

Which of the following targeted the organization?

An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled. Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D

June 5, 2021 No Comments READ MORE +