Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred . Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD ....

February 27, 2022 No Comments READ MORE +

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:A . business continuity planB . communications plan.C . disaster recovery plan.D . continuity of operations planView AnswerAnswer: C

February 27, 2022 No Comments READ MORE +

Which of the following tools will the administrator MOST likely use to confirm the suspicions?

A security administrator suspects there may be unnecessary services running on a server . Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A Explanation: https://nmap.org/book/man-version-detection.html NMAP scans running services and can tell you what...

February 27, 2022 No Comments READ MORE +

Which of the following control types is an IDS?

A network administrator has been asked to install an IDS to improve the security posture of an organization . Which of the following control types is an IDS?A . CorrectiveB . PhysicalC . DetectiveD . AdministrativeView AnswerAnswer: C Explanation: IDS = Intrusion Detection System. It is passive and only notifies...

February 27, 2022 No Comments READ MORE +

Which of the following would be BEST to help mitigate this concern?

A consultant is configuring a vulnerability scanner for a large, global organization in multiple countries. The consultant will be using a service account to scan systems with administrative privileges on a weekly basis, but there is a concern that hackers could gain access to account to the account and pivot...

February 27, 2022 No Comments READ MORE +

Which of the following technologies are being utilized to provide these capabilities?

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time . Which of the following...

February 27, 2022 No Comments READ MORE +

Which of the following refers to applications and systems that are used within an organization without consent or approval?

Which of the following refers to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A

February 27, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly . Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer:...

February 26, 2022 No Comments READ MORE +

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A

February 26, 2022 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment . Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed...

February 26, 2022 No Comments READ MORE +