Which of the following would be BEST to address the ClO’s concerns?

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....

February 26, 2022 No Comments READ MORE +

Which of the following methods would BEST accomplish this goal?

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process . Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB...

February 26, 2022 No Comments READ MORE +

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team . Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC...

February 26, 2022 No Comments READ MORE +

Which of the following is MOST likely occurring?

While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on...

February 26, 2022 No Comments READ MORE +

Which of the following would be BEST to solve this issue?

A network engineer notices the VPN concentrator overloaded and crashes on days when there are a lot of remote workers. Senior management has placed greater importance on the availability of VPN resources for the remote workers than the security of the end users’ traffic . Which of the following would...

February 25, 2022 No Comments READ MORE +

Which of the following would be the BEST way to achieve this objective?

A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords . Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C

February 25, 2022 No Comments READ MORE +

Which of the following solutions would BEST support the policy?

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices . Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A

February 25, 2022 No Comments READ MORE +

Which of the following is the purpose of a risk register?

Which of the following is the purpose of a risk register?A . To define the level or risk using probability and likelihoodB . To register the risk with the required regulatory agenciesC . To identify the risk, the risk owner, and the risk measuresD . To formally log the type...

February 25, 2022 No Comments READ MORE +

Which of the following social-engineering techniques was used in this case?

A user recent an SMS on a mobile phone that asked for bank delays . Which of the following social-engineering techniques was used in this case?A . SPIMB . VishingC . Spear phishingD . SmishingView AnswerAnswer: D

February 25, 2022 No Comments READ MORE +

Which of the following should the engineer employ to meet these requirements?

A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet...

February 24, 2022 No Comments READ MORE +