Which of the following tools can BEST accomplish this talk?

A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools to map services running on it to the server's listening ports. Which of the following tools can BEST accomplish this talk?A . NetcatB . NetstatC . NmapD . NessusView AnswerAnswer:...

March 8, 2021 No Comments READ MORE +

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...

March 8, 2021 No Comments READ MORE +

Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)

Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)A . Cross-site scriptingB . Data exfiltrationC . Poor system loggingD ....

March 8, 2021 No Comments READ MORE +

Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?

Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?A . The data ownerB . The data processorC . The data stewardD . The data privacy officer.View AnswerAnswer: C

March 7, 2021 No Comments READ MORE +

Which of the following is MOST likely causing the malware alerts?

Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS. Which of...

March 7, 2021 1 Comment READ MORE +

Which of the following would BEST meet this need?

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D

March 7, 2021 No Comments READ MORE +

Which of the following ISO standards is certified for privacy?

Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C

March 7, 2021 No Comments READ MORE +

Which of the following control sets should a well-written BCP include? (Select THREE)

Which of the following control sets should a well-written BCP include? (Select THREE)A . PreventiveB . DetectiveC . DeterrentD . CorrectiveE . CompensatingF . PhysicalG . RecoveryView AnswerAnswer: A,D,G

March 6, 2021 No Comments READ MORE +

Which of the following would BEST help the team ensure the application is ready to be released to production?

The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?A . Limit the...

March 6, 2021 No Comments READ MORE +

Which of the following would MOST likely allow the company to find the cause?

A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet. Which of the following would MOST likely allow the company to find the cause?A . ChecksumsB . WatermarksC . Oder of volatilityD . A log analysisE...

March 6, 2021 No Comments READ MORE +