Which of the following should the CISO implement to BEST meet these requirements?

A business is growing and starting to branch out into other locations. In anticipation of opening an office in a different country, the Chief Information Security Officer (CISO) and legal team agree they need to meet the following criteria regarding data to open the new office: ✑ Store taxation-related documents...

March 15, 2021 No Comments READ MORE +

Which of the following types of attack vector did the penetration tester use?

An internal penetration tester was assessing a recruiting page for potential issues before it was pushed to the production website. The penetration tester discovers an issue that must be corrected before the page goes live. The web host administrator collects the log files below and gives them to the development...

March 14, 2021 No Comments READ MORE +

Using the table above, which of the following would be the BEST business-driven choice among five possible solutions?

After investigating virus outbreaks that have cost the company $1000 per incident, the company’s Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet...

March 14, 2021 No Comments READ MORE +

Which of the following is the BEST way to address these issues and mitigate risks to the organization?

A company’s existing forward proxies support software-based TLS decryption, but are currently at 60% load just dealing with AV scanning and content analysis for HTTP traffic. More than 70% outbound web traffic is currently encrypted. The switching and routing network infrastructure precludes adding capacity, preventing the installation of a dedicated...

March 14, 2021 No Comments READ MORE +

Which of the following solutions BEST meets all of the architect’s objectives?

A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable....

March 14, 2021 No Comments READ MORE +

Which of the following tools can the systems administrator use to reproduction these symptoms?

A network service on a production system keeps crashing at random times. The systems administrator suspects a bug in the listener is causing the service to crash, resuming in the a DoS. Which the service crashes, a core dump is left in the /tmp directory. Which of the following tools...

March 14, 2021 No Comments READ MORE +

Which of the following should be configured?

A company’s security policy states any remote connections must be validated using two forms of network-based authentication. It also states local administrative accounts should not be used for any remote access. PKI currently is not configured within the network. RSA tokens have been provided to all employees, as well as...

March 13, 2021 No Comments READ MORE +

Which of the following should the security team implement FIRST?

A company recently deployed an agent-based DLP solution to all laptop in the environment. The DLP solution is configured to restrict the following: • USB ports • FTP connections • Access to cloud-based storage sites • Outgoing email attachments • Saving data on the local C: drive Despite these restrictions,...

March 13, 2021 No Comments READ MORE +

In addition to changes in legal frameworks, which of the following is a primary purpose of a compliance management program?

An organization is engaged in international business operations and is required to comply with various legal frameworks. In addition to changes in legal frameworks, which of the following is a primary purpose of a compliance management program?A . Following new requirements that result from contractual obligationsB . Answering requests from...

March 13, 2021 No Comments READ MORE +

A vulnerability scan with the latest definitions was performed across Sites A and B

DRAG DROP A vulnerability scan with the latest definitions was performed across Sites A and B. Match each relevant finding to the affected host-After associating the finding with the appropriate host(s), click the host to select the appropriate corrective action for that finding. View AnswerAnswer:

March 13, 2021 No Comments READ MORE +