Which of the following BEST describes this type of email?

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize. Which of the following BEST describes this type of email?A ....

May 29, 2021 No Comments READ MORE +

Which of the following would MOST likely cause a data breach?

The website http://companywebsite.com requires users to provide personal Information, Including security question responses, for registration. Which of the following would MOST likely cause a data breach?A . Lack of input validationB . Open permissionsC . Unsecure protocolD . Missing patchesView AnswerAnswer: C

May 28, 2021 No Comments READ MORE +

Which of the following should the administrator use?

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?A . ddB . chmodC . dnsenumD . loggerView AnswerAnswer: A

May 28, 2021 No Comments READ MORE +

Which of the following must the administrator configure to meet this requirement?

A cloud administrator is configuring five compute instances under the same subnet in a VPC Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this...

May 28, 2021 No Comments READ MORE +

Which of the following methods would BEST prevent data?

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent data? (Select TWO)A . VPNB . Drive encryptionC . Network firewallD . File-level encryptionE . USB blockerF . MFAView AnswerAnswer: B,E

May 27, 2021 No Comments READ MORE +

Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option...

May 27, 2021 No Comments READ MORE +

Which of the following components forwards the logs to a central source?

A company was recently breached Part of the company's new cybersecurity strategy is to centralize the logs from all security devices Which of the following components forwards the logs to a central source?A . Log enrichment B Log aggregationB . Log parserC . Log collectorView AnswerAnswer: C

May 27, 2021 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed FDD...

May 27, 2021 No Comments READ MORE +

Which of the following tools should the analyst use?

A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers Which of the following tools should the analyst use?A . netstatB . net shareC . netcatD . nbtstatE . net sessionView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which of the following should the analyst implement to authenticate the entire packet?

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?A . AHB . ESPC . SRTPD . LDAPView AnswerAnswer: B

May 27, 2021 No Comments READ MORE +