Which of the following will the technician MOST likely configure to provide the highest level of security with the least amount of overhead?
A network technician is installing a guest wireless network at a coffee shop. When a customer purchases an Item, the password for the wireless network is printed on the recent so the customer can log in. Which of the following will the technician MOST likely configure to provide the highest...
Which of the following attacks has occurred?
A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet. While reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...
Which of the following would be part of the images if all the metadata is still intact?
A security analyst discovers several .jpg photos from a cellular phone during a forensics investigation involving a compromised system. The analyst runs a forensics tool to gather file metadata. Which of the following would be part of the images if all the metadata is still intact?A . The GPS locationB...
Which of the following should the security manager implement to achieve the objective?
A security manager for a retailer needs to reduce the scope of a project to comply with PCI DSS. The PCI data is located in different offices than where credit cards are accepted. All the offices are connected via MPLS back to the primary datacenter. Which of the following should...
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?A . An SLAB . AnNDAC . ABPAD . AnMOUView AnswerAnswer: D
Which of the following would MOST likely help mitigate this issue?
Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C
In which of the following common use cases would steganography be employed?
In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A
Which of the following is MOST likely the cause of the reported issue?
A user recently attended an exposition and received some digital promotional materials The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?A...
Which of the following is the attacker MOST likely attempting?
An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker MOST likely attempting?A . A spear-phishing attackB . A watering-hole attackC . Typo squattingD . A phishing attackView AnswerAnswer: B
Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?
A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based firewallC...