Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server . Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A Explanation: https://nmap.org/book/man-version-detection.html NMAP scans running services and can tell you what...
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)A . AlarmsB . SignageC . LightingD . MantrapsE . FencingF . SensorsView AnswerAnswer: D,E
Which of the following targeted the organization?
An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled . Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D Explanation: https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/ https://csrc.nist.gov/glossary/term/advanced_persistent_threat
http://dev-site.comptia.org/home/show.php?
A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is...
In which of the following common use cases would steganography be employed?
In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A
Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?
A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports . Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based...
Which of the following access control schemes would be BEST for the company to implement?
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels . Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D
Which of the following account policies would BEST prevent this type of attack?
A workwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil . Which of the following account policies would BEST prevent this type of attack?A...
Which of the following steps should also be taken to harden the smart switch?
A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The...
Which of the following types of attacks does this MOST likely represent?
A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?A . Rainbow tableB . Brute-forceC . Password-sprayingD . DictionaryView AnswerAnswer: C Explanation: Password spraying is a type of brute-force attack in which a malicious actor uses a single...