Which of the following control types has the organization implemented?
An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?A . Steganography B. Homomotphic encryption C. Cipher surte D. BlockchainView AnswerAnswer: A Explanation: Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order...
Which of the following methods will the analyst MOST likely use?
A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?A . Look for tampenng on the evidence collection bag B. Encrypt the collected data using asymmetric encryption C. Ensure proper procedures for...
Which of the following describes this attack?
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the...
Which of the following attacks has MOST likely occurred?
Security analysts are conducting an investigation of an attack that occurred inside the organization’s network. An attacker was able to connect network traffic between workstation throughout the network. The analysts review the following logs: The layer 2 address table has hundred of entries similar to the ones above. Which of...
Which of the following is MOST likely the result of the security analyst's review?
Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a Security analyst for further review. The security analyst reviews the following metrics: Which of the following is MOST likely the result of the security analyst's review?A . The ISP is dropping outbound...
Which of the following firewall policies would be MOST secure for a web server?
After a recent security incident, a security analyst discovered that unnecessary ports were open on a firewall policy for a web server. Which of the following firewall policies would be MOST secure for a web server? A) B) C) D) A . Option A B. Option B C. Option C...
CORRECT TEXT
CORRECT TEXT An incident has occurred in the production environment. Analyze the command outputs and identify the type of compromise. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. View AnswerAnswer: Answer as SQL injection Graphical user...
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?A . Transit gateway B. Cloud hot site C. Edge computing D. DNS sinkholeView AnswerAnswer: A
Which of the following is a known security nsk associated with data archives that contain financial information?
Which of the following is a known security nsk associated with data archives that contain financial information?A . Data can become a liability if archived longer than required by regulatory guidance B. Data must be archived off-site to avoid breaches and meet business requirements C. Companies are prohibited from providing...