Which of the following would MOST likely show where the malware originated?
A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?A . The DNS logsB . The...
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A
Which of the following solutions would BEST support the policy?
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)A . AlarmsB . SignageC . LightingD . MantrapsE . FencingF . SensorsView AnswerAnswer: D,E
Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?
A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...
Which of the following would be BEST to address the ClO’s concerns?
An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....
Which of the following describes the ability of code to target a hypervisor from inside
Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B Explanation: Virtual machine escape is an exploit in which the attacker runs code on a VM that allows...
Which of the following would be MOST suitable for training the developers'?
A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers. Which of the following would be MOST suitable for training the developers'?A . A capture-the-flag competitionB . A phishing simulationC . Physical...
Which of the following would BEST help the team ensure the application is ready to be released to production?
The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?A . Limit the...
Which of the following security practices would have addressed the issue?
A retail executive recently accepted a job with a major competitor. The following week, a security analyst reviews the security logs and identifies successful logon attempts to access the departed executive's accounts. Which of the following security practices would have addressed the issue?A . A non-disclosure agreementB . Least privilegeC...