Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configunng network devices?

After a recent security breach a security analyst reports that several admimstratrve usemames and passwords are being sent via cieartext across the network to access network devices over prot 23. Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and...

January 17, 2023 No Comments READ MORE +

An attack has occurred against a company

DRAG DROP An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the following: Identify the type of attack that is occurring on the network by clicking on the attacker’s tablet and reviewing the output. (Answer Area 1). Identify which compensating controls should be implemented on...

January 16, 2023 No Comments READ MORE +

Which of the following is a benefit of including a risk management framework into an organization's security approach?

Which of the following is a benefit of including a risk management framework into an organization's security approach?A . It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner B. It identifies specific vendor products that have been tested and...

January 16, 2023 No Comments READ MORE +

Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?

Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?A . Putting security/antitamper tape over USB ports logging the port numbers and regularly inspecting the ports B. Implementing a GPO that will restrict access to authorized USB removable media...

January 16, 2023 No Comments READ MORE +

Which of the following employee roles is responsible for protecting an organization's collected personal information?

Which of the following employee roles is responsible for protecting an organization's collected personal information?A . CTO B. DPO C. CEO D. DBAView AnswerAnswer: B Explanation: Many companies also have a data protection officer or DPO. This is a higher-level manager who is responsible for the organization's overall data privacy...

January 16, 2023 No Comments READ MORE +

Which of Ihe following would mitigate the issue?

Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounls. Which of Ihe following...

January 16, 2023 No Comments READ MORE +

Which of the following attacks explains what occurred?

Data exftitration analysis indicates that an attacker managed to download system configuration notes from a web server. The web-server logs have been deleted, but analysts have determined that the system configuration notes were stored in the database administrator's folder on the web server. Which of the following attacks explains what...

January 16, 2023 No Comments READ MORE +

Which of the following is the policy MOST likely protecting against?

The Chief Compliance Officer from a bank has approved a background check policy for all new hires. Which of the following is the policy MOST likely protecting against?A . Preventing any current employees' siblings from working at the bank to prevent nepotism B. Hiring an employee who has been convicted...

January 16, 2023 No Comments READ MORE +

Which of the following will the blue team do after detecting an loC?

An organization has hired a ted team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an loC?A . Reimage the impacted workstations B. Activate runbooks for incident response C. Conduct forensics on the compromised system D. Conduct passive reconnaissance to...

January 16, 2023 No Comments READ MORE +

Which of the following should the company do to help accomplish this goal?

A company is implementing a DLP solution on the file server. The file server has Pll. financial information, and health information stored on it Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the...

January 16, 2023 No Comments READ MORE +