Which of the following is the BEST way to proceed?

In order to meet regulatory compliance objectives for the storage of PHI, vulnerability scans must be conducted on a continuous basis. The last completed scan of the network returned 5,682 possible vulnerabilities. The Chief Information Officer (CIO) would like to establish a remediation plan to resolve all known issues. Which...

February 25, 2020 No Comments READ MORE +

Which of the following steps should be taken to assist in the development of the disaster recovery plan?

An organization is requesting the development of a disaster recovery plan. The organization has grown and so has its infrastructure. Documentation, policies, and procedures do not exist. Which of the following steps should be taken to assist in the development of the disaster recovery plan?A . Conduct a risk assessment.B...

February 25, 2020 No Comments READ MORE +

Which of the following frameworks would BEST support the program?

Due to new regulations, a company has decided to institute an organizational vulnerability management program and assign the function to the security team. Which of the following frameworks would BEST support the program? (Select two.)A . COBITB . NISTC . ISO 27000 seriesD . ITILE . OWASPView AnswerAnswer: BD

February 24, 2020 No Comments READ MORE +

Which of the following tests should be performed NEXT?

A software patch has been released to remove vulnerabilities from company’s software. A security analyst has been tasked with testing the software to ensure the vulnerabilities have been remediated and the application is still functioning properly. Which of the following tests should be performed NEXT?A . FuzzingB . User acceptance...

February 24, 2020 No Comments READ MORE +

Which of the following can be implemented to maintain the availability of the website?

A company has recently launched a new billing invoice website for a few key vendors. The cybersecurity analyst is receiving calls that the website is performing slowly and the pages sometimes time out. The analyst notices the website is receiving millions of requests, causing the service to become unavailable. Which...

February 24, 2020 No Comments READ MORE +

Which of the following attacks may be occurring?

A cybersecurity analyst is currently investigating a server outage. The analyst has discovered the following value was entered for the username: 0xbfff601a. Which of the following attacks may be occurring?A . Buffer overflow attackB . Man-in-the-middle attackC . Smurf attackD . Format string attackE . Denial of service attackView AnswerAnswer:...

February 24, 2020 No Comments READ MORE +

Which of the following has occurred on the workstation?

An analyst is observing unusual network traffic from a workstation. The workstation is communicating with a known malicious site over an encrypted tunnel. A full antivirus scan with an updated antivirus signature file does not show any sign of infection. Which of the following has occurred on the workstation?A ....

February 23, 2020 No Comments READ MORE +

After determining the alert was a true positive, which of the following represents the MOST likely cause?

A cybersecurity analyst has received an alert that well-known “call home” messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?A . Attackers are running...

February 23, 2020 No Comments READ MORE +

Which of the following is the BEST response?

A security audit revealed that port 389 has been used instead of 636 when connecting to LDAP for the authentication of users. The remediation recommended by the audit was to switch the port to 636 wherever technically possible. Which of the following is the BEST response?A . Correct the audit....

February 22, 2020 No Comments READ MORE +

In UnityVSA, what is the maximum storage capacity offered by the Professional license?

In UnityVSA, what is the maximum storage capacity offered by the Professional license?A . 4 TBB . 10 TBC . 25 TBD . 50 TBView AnswerAnswer: D Explanation: References: https://www.emc.com/collateral/TechnicalDocument/docu69362.pdf

February 22, 2020 No Comments READ MORE +