Which of the following should the security team do to prevent this from Happening in the future?

An organization blocks user access to command-line interpreters but hackers still managed to invoke the interpreters using native administrative tools. Which of the following should the security team do to prevent this from Happening in the future?A . Implement HIPS to block Inbound and outbound SMB ports 139 and 445.B...

June 3, 2021 No Comments READ MORE +

Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?A . MTBFB . RPOC...

June 3, 2021 No Comments READ MORE +

Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?

Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?A . To provide data to quantity risk based on the organization's systems.B . To keep all software and hardware fully patched for known vulnerabilitiesC...

June 2, 2021 No Comments READ MORE +

Which of the following BEST describes the type of password attack the attacker is performing?

An attacker has successfully exfiltrated several non-salted password hashes from an online system. Given the logs below: Which of the following BEST describes the type of password attack the attacker is performing?A . DictionaryB . Pass-the-hashC . Brute-forceD . Password sprayingView AnswerAnswer: A

June 1, 2021 No Comments READ MORE +

Which of the following would BEST meet these requirements?

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...

June 1, 2021 No Comments READ MORE +

Which of the following RAID configurations should the administration use?

A security administrator needs to create a RAIS configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?A . RA1D 0B . RAID1C . RAID 5D . RAID 10View AnswerAnswer:...

June 1, 2021 No Comments READ MORE +

Which of the following describes what the manager is doing?

A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the...

June 1, 2021 No Comments READ MORE +

In which of the following situations would it be BEST to use a detective control type for mitigation?

In which of the following situations would it be BEST to use a detective control type for mitigation?A . A company implemented a network load balancer to ensure 99.999% availability of its web application.B . A company designed a backup solution to increase the chances of restoring services in case...

June 1, 2021 No Comments READ MORE +

Which of the following MOST likely the cause of the cause of the access issues?

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?A . False rejectionB . Cross-over error rateC...

June 1, 2021 No Comments READ MORE +

Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based firewallC...

May 31, 2021 No Comments READ MORE +