Which of the following BEST describes this technique?

A customer service representative reported an unusual text message that was sent to the help desk. The message contained an unrecognized invoice number with a large balance due and a link to click for more details. Which of the following BEST describes this technique?A . Vishing B. Whaling C. Phishing...

February 13, 2023 No Comments READ MORE +

Which of the following options BEST fulfils the architect’s requirements?

DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfils the architect’s requirements?A . An orchestration solution that can adjust scalability of...

February 12, 2023 No Comments READ MORE +

In which of the following environments should the patch be deployed LAST?

An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?A . Test B. Staging C. Development D. ProductionView AnswerAnswer: A

February 12, 2023 No Comments READ MORE +

Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?

Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?A . Common Weakness Enumeration B. OSINT C. Dark web D. Vulnerability databasesView AnswerAnswer: C

February 12, 2023 No Comments READ MORE +

Which of the following issues is MOST likely occurring?

A systems administrator reports degraded performance on a virtual server. The administrator increases the virtual memory allocation which improves conditions, but performance degrades again after a few days. The administrator runs an anarysis tool and sees the following output: The administrator terminates the timeAttend.exe observes system performance over the next...

February 12, 2023 No Comments READ MORE +

Which of the following would BEST provide detective and corrective controls for thermal regulation?

Which of the following would BEST provide detective and corrective controls for thermal regulation?A . A smoke detector B. A fire alarm C. An HVAC system D. A fire suppression system E. GuardsView AnswerAnswer: C Explanation: What are the functions of an HVAC system? An HVAC system is designed to...

February 12, 2023 No Comments READ MORE +

Which of the following statements BEST describes zero-day exploits'?

Which of the following statements BEST describes zero-day exploits'?A . When a zero-day exploit is discovered, the system cannot be protected by any means B. Zero-day exploits have their own scoring category in CVSS C. A zero-day exploit is initially undetectable and no patch for it exists D. Discovering zero-day...

February 11, 2023 No Comments READ MORE +

Which of the following attacks was MOST likely used to cause the data toss?

A DBA reports that several production server hard drives were wiped over the weekend. The DBA also reports that several Linux servers were unavailable due to system files being deleted unexpectedly. A security analyst verified that software was configured to delete data deliberately from those servers. No backdoors to any...

February 11, 2023 No Comments READ MORE +

Which of the following terms describes a broad range of information that is sensitive to a specific organization?

Which of the following terms describes a broad range of information that is sensitive to a specific organization?A . Public B. Top secret C. Proprietary D. Open-sourceView AnswerAnswer: C

February 11, 2023 No Comments READ MORE +

Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?

Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?A . Shut down the VDI and copy off the event logs. B. Take a memory snapshot of the running system. C. Use NetFlow to identify command-and-control IPs. D. Run a full on-demand...

February 11, 2023 No Comments READ MORE +