Which of the following would MOST likely support the integrity of a voting machine?

Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: D

March 16, 2021 No Comments READ MORE +

Which of the following certificate types would BEST meet the requirements?

A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are: ✑ www.company.com (main website) ✑ contactus.company.com (for locating a nearby location) ✑ quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing...

March 16, 2021 No Comments READ MORE +

Which of the following would work BEST to help identify potential vulnerabilities?

An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?A . Hping3 Cs comptia, org Cp 80B . Nc -1 Cv comptia, org Cp 80C . nmp comptia, org...

March 16, 2021 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed FDD...

March 16, 2021 No Comments READ MORE +

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)A . Data accessibilityB . Legal holdC . Cryptographic or hash algorithmD . Data retention legislationE . Value and volatility of dataF . Right-to-audit clausesView AnswerAnswer: E,F

March 16, 2021 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst...

March 16, 2021 No Comments READ MORE +

Which of the following techniques BEST explains this action?

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?A . PredictabilityB . Key stretchingC . SaltingD . HashingView AnswerAnswer: C

March 15, 2021 No Comments READ MORE +

Which of the following will the company MOST likely review to trace this transaction?

After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?A . The public ledgerB . The NetFlow dataC . A checksumD . The event logView AnswerAnswer: A

March 15, 2021 No Comments READ MORE +

Which of the following attacks is MOST likely occurring?

Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs...

March 15, 2021 No Comments READ MORE +

Which of the following access control schemes BEST fits the requirements?

A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?A . Role-based access controlB . Discretionary access controlC . Mandatory access controlD . Attribute-based access controlView AnswerAnswer:...

March 15, 2021 No Comments READ MORE +