Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD ....

April 4, 2022 1 Comment READ MORE +

Which of the following would be BEST to help the organization’s executives determine the next course of action?

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine the next course of action?A . An incident response planB . A communications planC . A disaster recovery planD...

April 4, 2022 No Comments READ MORE +

An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes.

An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes. Which of the following is the 60-minute expectation an example of:A...

April 3, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

April 3, 2022 No Comments READ MORE +

Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

April 3, 2022 No Comments READ MORE +

Which of the following should the administrator use?

A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView AnswerAnswer:...

April 3, 2022 No Comments READ MORE +

http://dev-site.comptia.org/home/show.php?

A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is...

April 3, 2022 No Comments READ MORE +

Which of the following BEST describes the tasks the developer is conducting?

A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A

April 2, 2022 No Comments READ MORE +

In which of the following incident response phases is the security engineer currently operating?

In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?A . IdentificationB . PreparationC . EradictionD . RecoveryE . ContainmentView AnswerAnswer: E

April 2, 2022 No Comments READ MORE +

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?A . SaaSB . PaaSC . IaaSD . DaaSView AnswerAnswer: C

April 2, 2022 No Comments READ MORE +