Which of the following security practices would have addressed the issue?

A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and identifies successful logon attempts to access the departed executive's accounts . Which of the following security practices would have addressed the issue?A . A non-disclosure agreementB . Least...

April 14, 2022 No Comments READ MORE +

Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?

A company has limited storage available and online presence that cannot for more than four hours . Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?A...

April 14, 2022 No Comments READ MORE +

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?A . InvestigationB . ContainmentC . RecoveryD . Lessons learnedView AnswerAnswer: B

April 13, 2022 No Comments READ MORE +

Which of the following did the assessment identify?

A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D

April 13, 2022 No Comments READ MORE +

Which of the following would be the BEST way to achieve this objective?

A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords . Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C

April 13, 2022 No Comments READ MORE +

Which of the following would BEST protect the company from data exfiltration via removable media?

A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...

April 13, 2022 No Comments READ MORE +

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A

April 13, 2022 No Comments READ MORE +

Which of the following would meet the organization’s needs for a third factor?

An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B

April 13, 2022 No Comments READ MORE +

Which of the following access control schemes BEST fits the requirements?

A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner . Which of the following access control schemes BEST fits the requirements?A . Role-based access controlB . Discretionary access controlC . Mandatory access controlD . Attribute-based access controlView...

April 13, 2022 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites. INSTRUCTIONS Click on each firewall to do the following: ✑ Deny cleartext web traffic. ✑ Ensure secure management protocols are used. Please Resolve issues at the...

April 12, 2022 No Comments READ MORE +