Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configuring network devices?

After a recent security breach, a security analyst reports that several administrative usernames and passwords are being sent via cleartext across the network to access network devices over port 23. Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and...

February 11, 2023 No Comments READ MORE +

In order to reslnct PHI documents which of the following should be performed FIRST?

A company wants to restrict emailing of PHI documents. The company is implementing a DLP solution. In order to reslnct PHI documents which of the following should be performed FIRST?A . Retention B. Governance C. Classification D. Change managementView AnswerAnswer: C

February 11, 2023 No Comments READ MORE +

Which of Ihe following would mitigate the issue?

Multiple business accounts were compromised a few days after a public website had its credentials database leaked on the internet No business emails were Identified in the breach, but the security team thinks that the list of passwords exposed was later used to compromise business accounts. Which of Ihe following...

February 10, 2023 No Comments READ MORE +

Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?

During a recent incident an external attacker was able to exploit an SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?A . Check for any recent SMB CVEs B. Install AV on the affected server C....

February 10, 2023 No Comments READ MORE +

Which of the following is the environment in which patches will be deployed just prior to being put into an operational status?

An organization maintains several environments in which patches are developed and tested before deployed to an operation status. Which of the following is the environment in which patches will be deployed just prior to being put into an operational status?A . Development B. Test C. Production D. StagingView AnswerAnswer: D...

February 10, 2023 No Comments READ MORE +

Which of the following describes this type of alert?

A security analyst receives an alert from trie company's SIEM that anomalous activity is coming from a local source IP address of 192.168.34.26. The Chief Information Security Officer asks the analyst to block the originating source Several days later, another employee opens an internal ticket stating that vulnerability scans are...

February 10, 2023 No Comments READ MORE +

Which of the following account types Is MOST appropriate for this purpose?

A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types Is MOST appropriate for this purpose?A . Service B. Shared C....

February 10, 2023 No Comments READ MORE +

Which of the following was MOST likely observed?

A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into cltckmg the following: Which of the following was MOST likely observed?A . DLL injection B. Session...

February 10, 2023 No Comments READ MORE +

Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?

Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?A . Putting security/antitamper tape over USB ports logging the port numbers and regularly inspecting the ports B. Implementing a GPO that will restrict access to authorized USB removable media...

February 10, 2023 No Comments READ MORE +