Which of the following BEST represents this type of threat?
The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls . Which of the following BEST represents this type of threat?A . A script kiddieB . Shadow ITC . HacktivismD . White-hatView AnswerAnswer: B Explanation: Shadow IT...
Which of the following would be MOST suitable for training the developers'?
A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers . Which of the following would be MOST suitable for training the developers'?A . A capture-the-flag competitionB . A phishing simulationC ....
Which of the following is MOST likely causing the malware alerts?
Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS . Which...
Which of the following would MOST likely help mitigate this issue?
Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff . Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C
Which of the following would BEST meet the CSO's objectives?
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks . Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict...
Which of the following would be BEST to mitigate CEO’s concern?
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from...
Which of the following would MOST likely contain that information?
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button . Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer:...
Which of the following attacks was MOST likely used?
A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours . Which of the following attacks was MOST likely used?A...
Which of the following should the administrator configure?
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI . Which of the following should the administrator configure?A . A captive portalB . PSKC . 802.1XD . WPSView AnswerAnswer: C
Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?
A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrastructure and build out a customer-facing web application . Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?A . SIEMB . DLPC . CASBD . SWGView AnswerAnswer:...