Which of the following statements BEST describes zero-day exploits'?

Which of the following statements BEST describes zero-day exploits'?A . When a zero-day exploit is discovered, the system cannot be protected by any means B. Zero-day exploits have their own scoring category in CVSS C. A zero-day exploit is initially undetectable and no patch for it exists D. Discovering zero-day...

January 26, 2023 No Comments READ MORE +

Which of the following is the BEST certificate for these requirements?

A tax organization is working on a solution to validate the online submission of documents The solution should be earned on a portable USB device that should be inserted on any computer that is transmitting a transaction securely. Which of the following is the BEST certificate for these requirements?A ....

January 26, 2023 No Comments READ MORE +

Which of the following firewall policies would be MOST secure for a web server?

After a recent security incident, a security analyst discovered that unnecessary ports were open on a firewall policy for a web server. Which of the following firewall policies would be MOST secure for a web server? A) B) C) D) A . Option A B. Option B C. Option C...

January 25, 2023 No Comments READ MORE +

Which biometric error would allow an unauthorized user to access a system?

Which biometric error would allow an unauthorized user to access a system?A . False acceptance B. False entrance C. False rejection D. False denialView AnswerAnswer: C

January 25, 2023 No Comments READ MORE +

Which of the following is the security analyst MOST likely implementing?

A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected. Which of the following is the security analyst MOST likely implementing?A . Vulnerability scans B. User behavior analysis C. Security orchestration, automation, and response D. Threat...

January 25, 2023 No Comments READ MORE +

Digital signatures use asymmetric encryption. This means the message is encrypted with:

Digital signatures use asymmetric encryption. This means the message is encrypted with:A . the sender's private key and decrypted with the sender's public key B. the sender's public key and decrypted with the sender's private key C. the sender’s private key and decrypted with the recipient's public key. D. the...

January 25, 2023 No Comments READ MORE +

Which of the following is the BEST security solution to reduce this risk?

The Chief Information Security Officer directed a nsk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?A . CASB B. VPN concentrator C. MFA D. VPC...

January 25, 2023 No Comments READ MORE +

Which of the following was MOST likely observed?

A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into cltckmg the following: Which of the following was MOST likely observed?A . DLL injection B. Session...

January 24, 2023 No Comments READ MORE +

Which of the following solutions should the SOC consider to BEST improve its response time?

The SOC for a large MSSP is meeting to discuss the lessons learned from a recent incident that took much too long to resolve This type of incident has become more common in recent weeks and is consuming large amounts of the analysts' time due to manual tasks being performed....

January 24, 2023 No Comments READ MORE +

Which of the following will increase cryptographic security?

Which of the following will increase cryptographic security?A . High data entropy B. Algorithms that require less computing power C. Longer key longevity D. HashingView AnswerAnswer: C

January 24, 2023 No Comments READ MORE +