Which of the following certificate types would BEST meet the requirements?

A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are: ✑ www.company.com (main website) ✑ contactus.company.com (for locating a nearby location) ✑ quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing...

March 8, 2022 No Comments READ MORE +

In which of the following situations would it be BEST to use a detective control type for mitigation?

In which of the following situations would it be BEST to use a detective control type for mitigation?A . A company implemented a network load balancer to ensure 99.999% availability of its web application.B . A company designed a backup solution to increase the chances of restoring services in case...

March 8, 2022 No Comments READ MORE +

In which of the following incident response phases is the security engineer currently operating?

In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?A . IdentificationB . PreparationC . EradictionD . RecoveryE . ContainmentView AnswerAnswer: E

March 8, 2022 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

March 8, 2022 No Comments READ MORE +

Which of the following describes the BEST approach for deploying application patches?

Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...

March 7, 2022 No Comments READ MORE +

Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code . Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD...

March 7, 2022 No Comments READ MORE +

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?A . InvestigationB . ContainmentC . RecoveryD . Lessons learnedView AnswerAnswer: B

March 7, 2022 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

March 7, 2022 No Comments READ MORE +

Which of the following intelligence sources should to security analyst review?

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute . Which of the following intelligence sources should to security analyst review?A . Vulnerability feedsB . Trusted automated exchange of indicator informationC . Structured threat information expressionD . Industry information-sharing...

March 6, 2022 No Comments READ MORE +

Which of the following is the MOST likely cause of the CRO’s concerns?

The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed...

March 6, 2022 No Comments READ MORE +