Which of the following recommendation would MOST likely reduce the risk of unauthorized access?

A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating...

December 9, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the customer’s inability to connect?

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite: Which of the following is the MOST likely cause of the customer’s inability to connect? A. Weak ciphers are being used. B. The...

December 9, 2021 No Comments READ MORE +

Which of the following will allow the inspection of the data without multiple certificate deployments?

A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed. Which of the following will allow the inspection of the data without multiple certificate deployments? A. Include all available cipher suites. B. Create a wildcard certificate....

December 9, 2021 No Comments READ MORE +

Which of the following is the BEST solution to meet these objectives?

A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive...

December 9, 2021 No Comments READ MORE +

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...

December 8, 2021 No Comments READ MORE +

Which of the following should Ann use to gather the required information?

Ann, a CIRT member, is conducting incident response activities on a network that consists of several hundred virtual servers and thousands of endpoints and users. The network generates more than 10,000 log messages per second. The enterprise belong to a large, web-based cryptocurrency startup, Ann has distilled the relevant information...

December 8, 2021 No Comments READ MORE +

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...

December 7, 2021 No Comments READ MORE +

Which of the following would BEST mitigate this vulnerability?

A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests: Which of the following would BEST mitigate this vulnerability?A . CAPTCHAB . Input validationC . Data encodingD . Network intrusion...

December 7, 2021 No Comments READ MORE +

Which of the following is a security concern that will MOST likely need to be addressed during migration?

A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . LatencyB . Data exposureC . Data lossD . Data dispersionView AnswerAnswer:...

December 7, 2021 1 Comment READ MORE +

Which of the following should the developer integrate into the process to BEST prevent this type of behavior?

An application developer is including third-party background security fixes in an application. The fixes seem to resolve a currently identified security issue. However, when the application is released to the public, report come In that a previously vulnerability has returned . Which of the following should the developer integrate into...

December 7, 2021 No Comments READ MORE +