Which of the following account policies would BEST prevent this type of attack?
A workwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil . Which of the following account policies would BEST prevent this type of attack?A...
A security engineer is setting up password less authentication for the first time
DRAG DROP A security engineer is setting up password less authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the...
Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?
A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP . Which of the following mitigations would...
Which of the following BEST explains the appliance’s vulnerable state?
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments . Which of the following BEST explains the appliance’s vulnerable state?A . The system was configured with weak default security settings.B . The device uses weak encryption ciphers.C...
A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is...
Which of the following types of controls is a turnstile?
Which of the following types of controls is a turnstile?A . PhysicalB . DetectiveC . CorrectiveD . TechnicalView AnswerAnswer: A
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...
Which of the following attacks MOST likely occurred on the original DNS server?
An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists....
Which of the following social-engineering techniques is the attacker using?
The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards . Which of the following...
Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical . Which of the following...