Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should...

November 10, 2021 No Comments READ MORE +

Which of the following BEST explains the appliance’s vulnerable state?

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?A . The system was configured with weak default security settings.B . The device uses weak encryption ciphers.C ....

November 10, 2021 No Comments READ MORE +

Which of the following would MOST likely have prevented this breach?

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD . BiometricsView...

November 10, 2021 No Comments READ MORE +

Which of the following would MOST likely support the integrity of a voting machine?

Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: B Explanation: “Blockchain technology has a variety of potential applications. It can ensure the integrity and transparency of financial transactions, online voting...

November 10, 2021 No Comments READ MORE +

Which of the following should the administrator use?

A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView AnswerAnswer:...

November 9, 2021 No Comments READ MORE +

Which of the following access control schemes BEST fits the requirements?

A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?A . Role-based access controlB . Discretionary access controlC . Mandatory access controlD . Attribute-based access controlView AnswerAnswer:...

November 9, 2021 No Comments READ MORE +

Which of the following risk management strategies is this an example of?

When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?A . AcceptanceB . MitigationC . AvoidanceD . TransferenceView AnswerAnswer: D Explanation: Risk Transference refers to the shifting...

November 9, 2021 No Comments READ MORE +

Which of the following RAID levels should the administrator select?

A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B

November 9, 2021 2 Comments READ MORE +

Which of the following would be the BEST way to achieve this objective?

A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C

November 9, 2021 No Comments READ MORE +

Which of the following did the assessment identify?

A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D

November 9, 2021 No Comments READ MORE +