Which of the following is MOST likely to be incorporated in the AUP?

A company wants to update its acceptable use policy (AUP) to ensure it relates to the newly implemented password standard, which requires sponsored authentication of guest wireless devices. Which of the following is MOST likely to be incorporated in the AUP?A . Sponsored guest passwords must be at least ten...

March 10, 2020 No Comments READ MORE +

Which of the following recommendations would meet the needs of the organization?

The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs...

March 10, 2020 No Comments READ MORE +

Which of the following may be occurring?

File integrity monitoring states the following files have been changed without a written request or approved change. The following change has been made: chmod 777 CRv /usr Which of the following may be occurring?A . The ownership pf /usr has been changed to the current user.B . Administrative functions have...

March 9, 2020 No Comments READ MORE +

Which of the following vulnerabilities has been identified?

After completing a vulnerability scan, the following output was noted: Which of the following vulnerabilities has been identified?A . PKI transfer vulnerability.B . Active Directory encryption vulnerability.C . Web application cryptography vulnerability.D . VPN tunnel vulnerability.View AnswerAnswer: C

March 9, 2020 No Comments READ MORE +

Which of the following should the analyst use?

An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port. Which of the following should the analyst use?A . WiresharkB . QualysC . netstatD . nmapE . pingView AnswerAnswer:...

March 9, 2020 No Comments READ MORE +

Which of the following BEST describes the offensive participants in a tabletop exercise?

Which of the following BEST describes the offensive participants in a tabletop exercise?A . Red teamB . Blue teamC . System administratorsD . Security analystsE . Operations teamView AnswerAnswer: A

March 8, 2020 No Comments READ MORE +

Which of the following actions is the BEST approach for the analyst to perform?

A cybersecurity analyst has several SIEM event logs to review for possible APT activity. The analyst was given several items that include lists of indicators for both IP addresses and domains. Which of the following actions is the BEST approach for the analyst to perform?A . Use the IP addresses...

March 8, 2020 No Comments READ MORE +

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)

Which of the following remediation strategies are MOST effective in reducing the risk of a network-based compromise of embedded ICS? (Select two.)A . PatchingB . NIDSC . SegmentationD . Disabling unused servicesE . FirewallingView AnswerAnswer: CD

March 8, 2020 No Comments READ MORE +

A vulnerability scan has returned the following information: Which of the following describes the meaning of these results?

A vulnerability scan has returned the following information: Which of the following describes the meaning of these results? A . There is an unknown bug in a Lotus server with no Bugtraq IC . Connecting to the host using a null session allows enumeration of share names.D . Trend Micro...

March 7, 2020 No Comments READ MORE +

Which of the following attacks is occurring?

A security analyst is reviewing IDS logs and notices the following entry: Which of the following attacks is occurring?A . Cross-site scriptingB . Header manipulationC . SQL injectionD . XML injectionView AnswerAnswer: C

March 6, 2020 No Comments READ MORE +