Which of the following account policies would BEST prevent this type of attack?

A workwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil . Which of the following account policies would BEST prevent this type of attack?A...

March 2, 2022 No Comments READ MORE +

A security engineer is setting up password less authentication for the first time

DRAG DROP A security engineer is setting up password less authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the...

March 1, 2022 No Comments READ MORE +

Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP . Which of the following mitigations would...

March 1, 2022 No Comments READ MORE +

Which of the following BEST explains the appliance’s vulnerable state?

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments . Which of the following BEST explains the appliance’s vulnerable state?A . The system was configured with weak default security settings.B . The device uses weak encryption ciphers.C...

March 1, 2022 No Comments READ MORE +

A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.

A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is...

March 1, 2022 No Comments READ MORE +

Which of the following types of controls is a turnstile?

Which of the following types of controls is a turnstile?A . PhysicalB . DetectiveC . CorrectiveD . TechnicalView AnswerAnswer: A

March 1, 2022 No Comments READ MORE +

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...

March 1, 2022 No Comments READ MORE +

Which of the following attacks MOST likely occurred on the original DNS server?

An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists....

March 1, 2022 No Comments READ MORE +

Which of the following social-engineering techniques is the attacker using?

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards . Which of the following...

March 1, 2022 No Comments READ MORE +

Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical . Which of the following...

February 28, 2022 No Comments READ MORE +