Which of the following processes would BEST satisfy this requirement?

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The...

December 14, 2021 No Comments READ MORE +

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?A . Deploy a SOAR tool.B . Modify user password history...

December 13, 2021 No Comments READ MORE +

Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were...

December 12, 2021 No Comments READ MORE +

Which of the following documents will MOST likely contain these elements?

Company A is establishing a contractual with Company B. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights . Which of the following documents will MOST likely contain these elements?A . Company A-B SLA v2.docxB . Company A...

December 12, 2021 No Comments READ MORE +

Which of the following should the company implement to ensure it can meet the computing demand while complying with healthcare standard for virtualization and cloud computing?

A health company has reached the physical and computing capabilities in its datacenter, but the computing demand continues to increase. The infrastructure is fully virtualized and runs custom and commercial healthcare application that process sensitive health and payment information . Which of the following should the company implement to ensure...

December 11, 2021 No Comments READ MORE +

Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels. Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?A . Spawn a shell using...

December 10, 2021 No Comments READ MORE +

Which of the following BEST describes the reason why traditional methods of addressing risk may not be possible in the cloud?

An organization is preparing to migrate its production environment systems from an on-premises environment to a cloud service. The lead security architect is concerned that the organization's current methods for addressing risk may not be possible in the cloud environment. Which of the following BEST describes the reason why traditional...

December 10, 2021 No Comments READ MORE +

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...

December 10, 2021 No Comments READ MORE +

Which of the following is the MOST cost-effective solution?

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to...

December 10, 2021 No Comments READ MORE +

Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating...

December 9, 2021 No Comments READ MORE +