Which of the following BEST describe this type of attack?
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all...
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?A . Red teamB . While teamC . Blue teamD . Purple teamView AnswerAnswer: A Explanation: Red team―performs the offensive role to try to infiltrate the target.
Which of the following would BEST prevent this attack from reoccurring?
A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom . Which of the following would BEST prevent this attack from reoccurring?A . Configure the perimeter firewall to deny inbound external connections to...
Which of the following access control schemes BEST fits the requirements?
A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner . Which of the following access control schemes BEST fits the requirements?A . Role-based access controlB . Discretionary access controlC . Mandatory access controlD . Attribute-based access controlView...
As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?A . Order of volatilityB . Data recoveryC . Chain of custodyD . Non-repudiationView AnswerAnswer: C
Which of the following network attacks is the researcher MOST likely experiencing?
A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message: Which of the following...
Which of the following demonstrates what the administrator is providing?
After entering a username and password, and administrator must gesture on a touch screen . Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D
Which of the following types of attacks does this MOST likely represent?
A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?A . Rainbow tableB . Brute-forceC . Password-sprayingD . DictionaryView AnswerAnswer: C Explanation: Password spraying is a type of brute-force attack in which a malicious actor uses a single...
Which of the following would be BEST to improve the incident response process?
The SOC is reviewing process and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. The allowed the malware to spread to additional hosts before it was contained . Which of the...
Which of the following implementations would be BEST to prevent the issue from reoccurring?
A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications . Which of the following implementations would be BEST to prevent the issue from reoccurring?A . CASBB ....