Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option...

March 17, 2021 No Comments READ MORE +

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C

March 17, 2021 No Comments READ MORE +

Which of the following should the engineer do to determine the issue?

A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should...

March 17, 2021 No Comments READ MORE +

Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?

Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?A . Stored proceduresB . Buffer overflowsC . Data biasD . Code reuseView AnswerAnswer: C Explanation: https://lionbridge.ai/articles/7-types-of-data-bias-in-machine-learning/

March 17, 2021 1 Comment READ MORE +

Which of the following should a security engineer do to prevent such an attack in the future?

A company recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive data. Which of the following should a security engineer do to prevent such an attack in the future?A . Use password hashing.B . Enforce...

March 17, 2021 No Comments READ MORE +

Which of the following would meet the organization’s needs for a third factor?

An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B

March 17, 2021 No Comments READ MORE +

Which of the following should the administrator implement to find and remediate the Issue?

During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to...

March 17, 2021 No Comments READ MORE +

Which of the following intelligence sources should to security analyst review?

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?A . Vulnerability feedsB . Trusted automated exchange of indicator informationC . Structured threat information expressionD . Industry information-sharing and...

March 16, 2021 No Comments READ MORE +

Which of the following would MOST likely have prevented this breach?

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD . BiometricsView...

March 16, 2021 No Comments READ MORE +

Which of the following would BEST meet this objective?

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)A . Dual power supplyB . Off-site backupsC . Automatic OS upgradesD . NIC teamingE . Scheduled penetration testingF . Network-attached storageView AnswerAnswer:...

March 16, 2021 No Comments READ MORE +