Which of the following controls was being violated?

A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?A . Password complexity B. Password history C. Password reuse D. Password lengthView AnswerAnswer: B

February 1, 2023 No Comments READ MORE +

Digital signatures use asymmetric encryption. This means the message is encrypted with:

Digital signatures use asymmetric encryption. This means the message is encrypted with:A . the sender's private key and decrypted with the sender's public key B. the sender's public key and decrypted with the sender's private key C. the sender’s private key and decrypted with the recipient's public key. D. the...

February 1, 2023 No Comments READ MORE +

Preconfigure the client for an incoming guest.

Preconfigure the client for an incoming guest. The guest AD credentials are: User: guest01 Password: guestpass View AnswerAnswer: Use the same settings as describe in below images. Graphical user interface, application Description automatically generated Graphical user interface, text, application Description automatically generated

February 1, 2023 No Comments READ MORE +

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?A . EOL B. SLA C. MOU D. EOSLView AnswerAnswer: B

February 1, 2023 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

February 1, 2023 No Comments READ MORE +

company realizes it is still vulnerable because outbound traffic is not restricted and the adversary is able to maintain a presence in the network. In which of the following stages of the Cyber Kill Chain is the adversary currently operating?

During an incident response, an analyst applied rules to all inbound traffic on the border firewall and implemented ACLs on each critical server Following an investigation, the company realizes it is still vulnerable because outbound traffic is not restricted and the adversary is able to maintain a presence in the...

February 1, 2023 No Comments READ MORE +

Which of the following attacks in happening on the corporate network?

A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...

January 31, 2023 No Comments READ MORE +

Which of the following are required to BEST meet these objectives?

A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows • Critical fileshares will remain accessible during and after a natural disaster • Frve percent of hard disks can fail at any given time without impacting the data. • Systems...

January 31, 2023 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

January 31, 2023 No Comments READ MORE +

Which of the following should the organization use to compare biometric solutions?

An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?A . FRR B. Difficulty of use C. Cost D. FAR E. CERView AnswerAnswer: A

January 31, 2023 No Comments READ MORE +