Which of the following methods will the analyst MOST likely use?
A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?A . Look for tampenng on the evidence collection bag B. Encrypt the collected data using asymmetric encryption C. Ensure proper procedures for...
Which of the following would detect intrusions at the perimeter of an airport?
Which of the following would detect intrusions at the perimeter of an airport?A . Signage B. Fencing C. Motion sensors D. Lighting E. BollardsView AnswerAnswer: C
Which of the following is the BEST remediation strategy?
A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers. Which of the following is the BEST remediation strategy?A . Update the base container image and redeploy the environment B. Include the containers in the regular patching schedule for servers C. Patch...
Which of the following is the MOST effective control against zero-day vulnerabilities?
Which of the following is the MOST effective control against zero-day vulnerabilities?A . Network segmentation B. Patch management C. Intrusion prevention system D. Multiple vulnerability scannersView AnswerAnswer: A
Which of the following attacks took place?
An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?A . On-path attack B....
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?A . Transit gateway B. Cloud hot site C. Edge computing D. DNS sinkholeView AnswerAnswer: A
Which of the following does this action describe?
A routine audit of medical billing claims revealed that several claims were submitted without the subscriber's knowledge. A review of the audit logs for the medical billing company's system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account. Which of the...
Which of the following attacks in happening on the corporate network?
A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...
Which of the following solutions will require the LEAST management and support from the company?
A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?A . SaaS B. IaaS C. PaaS D. SDNView AnswerAnswer: A...
Which of the following controls was being violated?
A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?A . Password complexity B. Password history C. Password reuse D. Password lengthView AnswerAnswer: B