Which of the following does this process BEST protect?

A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?A . Data in transit B. Data in processing C. Data at rest D. Data tokenizationView AnswerAnswer: C Explanation: Data at rest: Data at rest...

January 31, 2023 No Comments READ MORE +

Which of the following describes the continuous delivery software development methodology?

Which of the following describes the continuous delivery software development methodology?A . Waterfall B. Spiral C. V-shaped D. AgileView AnswerAnswer: D

January 31, 2023 No Comments READ MORE +

Which of the following incident response processes is the CISO requesting?

The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?A . Lessons learned B. Preparation C. Detection D. Containment E. Root cause analysisView AnswerAnswer: A

January 31, 2023 No Comments READ MORE +

Which of the following actions would be BEST to prevent reinfection from the initial infection vector?

An organization has activated an incident response plan due to a malware outbreak on its network. The organization has brought in a forensics team that has identified an internet-facing Windows server as the likely point of initial compromise. The malware family that was detected is known to be distributed by...

January 31, 2023 No Comments READ MORE +

A company labeled some documents with the public sensitivity classification.

A company labeled some documents with the public sensitivity classification. This means the documents can be accessed by:A . employees of other companies and the press B. all members of the department that created the documents C. only the company's employees and those listed in the document D. only the...

January 31, 2023 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

January 30, 2023 No Comments READ MORE +

Which biometric error would allow an unauthorized user to access a system?

Which biometric error would allow an unauthorized user to access a system?A . False acceptance B. False entrance C. False rejection D. False denialView AnswerAnswer: C

January 30, 2023 No Comments READ MORE +

Which of the following should be implemented to BEST address the CSO's concerns?

A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls. Which of the following...

January 30, 2023 No Comments READ MORE +

Which of the following is the MOST likely attack conducted on the environment?

A junior security analyst iss conducting an analysis after passwords were changed on multiple accounts without users' interaction. The SIEM have multiple login entries with the following text: Which of the following is the MOST likely attack conducted on the environment?A . Malicious script B. Privilege escalation C. Doman hijacking...

January 30, 2023 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

January 30, 2023 No Comments READ MORE +