Which of the following security controls can be implemented?
A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing Employees who travel need their accounts protected without the nsk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following...
Which of the following will the blue team do after detecting an loC?
An organization has hired a ted team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an loC?A . Reimage the impacted workstations B. Activate runbooks for incident response C. Conduct forensics on the compromised system D. Conduct passive reconnaissance to...
Which of the following are common VoIP-associated vulnerabilities? (Select TWO).
Which of the following are common VoIP-associated vulnerabilities? (Select TWO).A . SPIM B. vishing C. Hopping D. Phishing E. Credential harvesting F. TailgatingView AnswerAnswer: A,B
Which of the following solutions would BEST meet the needs of the company?
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of...
Which of the following attack vectors was exploited to install the hardware?
After returning from a conference, a user's laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard . Which of the following attack vectors was exploited to install...
Which of the following BEST describes the importance of the final phase of the incident response plan?
A security incident has been resolved. Which of the following BEST describes the importance of the final phase of the incident response plan?A . It examines and documents how well the team responded discovers what caused the incident, and determines how the incident can be avoided in the future B....
Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?
A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement. Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?A . Autopsy B. Cuckoo C....
Which of the following should the company do to help accomplish this goal?
A company is implementing a DLP solution on the file server. The file server has Pll. financial information, and health information stored on it Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the...
Which of the following should the company do FIRST?
An application developer accidentally uploaded a company's code-signing certificate private key to a public web server. The company is concerned about malicious use of its certificate. Which of the following should the company do FIRST?A . Delete the private key from the repository. B. Verify the public key is not...
Which of the following mobile solutions would accomplish these goals?
An organization would like to give remote workers the ability to use applications hosted inside the corporate network Users will be allowed to use their personal computers or they will be provided organization assets Either way no data or applications will be installed locally on any user systems. Which of...