When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....

May 27, 2021 No Comments READ MORE +

Which of the following should administrator implement to protect the environment from this malware?

Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the...

May 27, 2021 No Comments READ MORE +

Which of the following sources would reveal if the CEO's personal information is for sale?

A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?A . Automated information sharingB . Open-source intelligenceC . The dark webD . Vulnerability databasesView AnswerAnswer: C

May 27, 2021 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

May 26, 2021 No Comments READ MORE +

Which of the following tools should the analyst use to further review the pcap?

An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfer the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?A . NmapB...

May 26, 2021 No Comments READ MORE +

Which of the following attacks has occurred?

A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, while reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...

May 26, 2021 No Comments READ MORE +

Which of the following will the forensics investigator MOST likely determine has occurred?

A forensics investigator is examining a number of unauthorized payments the were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing...

May 25, 2021 1 Comment READ MORE +

Which of the following should the administrator implement?

A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of...

May 25, 2021 No Comments READ MORE +

Which of the following relets to applications and systems that are used within an organization without consent or approval?

Which of the following relets to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A

May 25, 2021 No Comments READ MORE +

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...

May 25, 2021 No Comments READ MORE +