Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used. Which of the following would BEST secure the routes while allowing the network to function in the event of a...

March 11, 2022 No Comments READ MORE +

Which of the following would be the BEST solution to harden the system?

A security engineer is hardening a company’s multihomed SFTP server. When scanning a public-facing network interface, the engineer finds the following ports are open: 22 25 110 137 138 139 445 Internal Windows clients are used to transferring files to the server to stage them for customer download as part...

March 11, 2022 No Comments READ MORE +

Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information. Which of the following provides the BEST guidance for protecting such information while it is at...

March 11, 2022 No Comments READ MORE +

Which of the following should the organization implement to BEST ensure all requirements are met?

An organization developed a social media application that is used by customers in multiple remote geographic locations around the world. The organization’s headquarters and only datacenter are located in New York City. The Chief Information Security Officer wants to ensure the following requirements are met for the social media application:...

March 11, 2022 No Comments READ MORE +

Which of the following must be installed on authorized hosts for this new configuration to work properly?

A company provides guest WiFi access to the internet and physically separates the guest network from the company’s internal WIFI. Due to a recent incident in which an attacker gained access to the compay’s intend WIFI, the company plans to configure WPA2 Enterprise in an EAP- TLS configuration . Which...

March 11, 2022 No Comments READ MORE +

Which of the following processes can be used to identify potential prevention recommendations?

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring . Howe ver, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . DetectionB . RemediationC . PreparationD . RecoveryView AnswerAnswer: A

March 10, 2022 No Comments READ MORE +

Which of the following solutions would BEST meet these requirements?

A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements: Only users with corporate-owned devices can directly access servers hosted by the cloud provider. The company can control what...

March 10, 2022 No Comments READ MORE +

Which of the following meets the budget needs of the business?

A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system: Which of the following meets the budget needs of the business?A . Filter ABCB . Filter XYZC . Filter GHID . Filter TUVView AnswerAnswer: C

March 10, 2022 No Comments READ MORE +

Which of the must occur to ensure the integrity of the image?

Immediately following the report of a potential breach, a security engineer creates a forensic image of the server in question as part of the organization incident response procedure . Which of the must occur to ensure the integrity of the image?A . The image must be password protected against changes.B...

March 10, 2022 No Comments READ MORE +

Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?

An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report: Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?A . Password crackerB . Port scannerC . Account enumeratorD . Exploitation frameworkView AnswerAnswer: A

December 17, 2021 No Comments READ MORE +