Which of the following would be the BEST way to achieve this objective?

A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C

May 30, 2022 No Comments READ MORE +

Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....

May 30, 2022 No Comments READ MORE +

Which of the following implementations would be BEST to prevent the issue from reoccurring?

A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent the issue from reoccurring?A . CASBB . SWGC...

May 29, 2022 No Comments READ MORE +

Which of the following would BEST meet this need?

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D Explanation: The Common Vulnerability Scoring System (CVSS) is a...

May 29, 2022 No Comments READ MORE +

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C

May 28, 2022 No Comments READ MORE +

Which of the following would BEST help the team ensure the application is ready to be released to production?

The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?A . Limit the...

May 28, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

May 28, 2022 No Comments READ MORE +

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B

May 28, 2022 No Comments READ MORE +

Based on the analyst’s findings, which of the following attacks is being executed?

A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: To better understand what is going on, the analyst runs a command and receives the following output:...

May 28, 2022 No Comments READ MORE +

Which of the following RAID levels should the administrator select?

A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B

May 28, 2022 No Comments READ MORE +