Which of the following documents did Ann receive?

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations. Which of the following documents did Ann receive?A . An annual privacy noticeB . A non-disclosure agreementC . A privileged-user agreementD . A memorandum...

January 7, 2024 No Comments READ MORE +

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls. This is an example of:

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls. This is an example of:A . prepending.B . an influence campaign.C . a watering-hole attack.D . intimidation.E . information elicitation.View AnswerAnswer: B...

January 6, 2024 No Comments READ MORE +

Which f the following configuration should an analysis enable To improve security?

A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which f the following configuration should an analysis enable To improve security? (Select TWO.) A. RADIUS B. PEAP C. WPS D. WEP-EKIP E. SSL F. WPA2-PSKView AnswerAnswer: A,...

January 6, 2024 No Comments READ MORE +

Which of the following should the organization use to inform the affected parties?

A security researcher has alerted an organization that its sensitive user data was found for sale on a website. Which of the following should the organization use to inform the affected parties?A . An incident response planB . A communications planC . A business continuity planD . A disaster recovery...

January 6, 2024 No Comments READ MORE +

Which of the following will the engineer MOST likely use to achieve this objective?

A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and are unable to support the addition of MFA. Which of the following will the engineer MOST likely use to achieve this...

January 6, 2024 No Comments READ MORE +

Which of the following MOST likely would have prevented the attacker from learning the service account name?

A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation: Which of the following MOST likely would have prevented the attacker from learning the service account name?A . Race condition testingB ....

January 6, 2024 No Comments READ MORE +

Which of the following would BEST allow this objective to be met?

The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?A . Requiring all new, on-site visitors to configure their...

January 6, 2024 No Comments READ MORE +

company implement to prevent this type of attack from occurring In the future?

A company recently experienced an attack during which its main website was Directed to the attacker's web server, allowing the attacker to harvest credentials from unsuspecting customers,. Which of the following should the company implement to prevent this type of attack from occurring In the future?A . IPsecB . SSL/TLSC...

January 6, 2024 No Comments READ MORE +

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?A . Unsecured root accountsB . Zero dayC . Shared tenancyD . Insider threatView AnswerAnswer: C Explanation: When hosting applications in the public cloud, there is a risk of shared tenancy, meaning that multiple...

January 6, 2024 No Comments READ MORE +

Which of the following resiliency techniques was applied to the network to prevent this attack?

A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted. Which of the following resiliency techniques was applied to the network to prevent this attack?A . NIC TeamingB . Port mirroringC...

January 5, 2024 No Comments READ MORE +