Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...

November 7, 2021 No Comments READ MORE +

Which of the following is the analyst doing?

A security analyst is using a recently released security advisory to review historical logs, looking for the specific activity that was outlined in the advisory. Which of the following is the analyst doing?A . A packet captureB . A user behavior analysisC . Threat huntingD . Credentialed vulnerability scanningView AnswerAnswer:...

November 7, 2021 No Comments READ MORE +

Which of the following would mitigate the damage done by this type of data exfiltration in the future?

A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?A . Create DLP controls that prevent...

November 7, 2021 No Comments READ MORE +

Which of the following attacks was MOST likely used?

A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?A ....

November 7, 2021 No Comments READ MORE +

Which of the following types of attacks does this MOST likely represent?

A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?A . Rainbow tableB . Brute-forceC . Password-sprayingD . DictionaryView AnswerAnswer: C Explanation: Password spraying is a type of brute-force attack in which a malicious actor uses a single...

November 7, 2021 No Comments READ MORE +

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C

November 7, 2021 No Comments READ MORE +

Which of the following should the engineer employ to meet these requirements?

A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....

November 7, 2021 No Comments READ MORE +

The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL: http://dev-site.comptia.org/home/show.php?

A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is...

November 6, 2021 No Comments READ MORE +

Which of the following solutions would meet the requirements?

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: ✑ Check-in/checkout of credentials ✑ The ability to use but not know the password ✑ Automated password changes ✑ Logging of access to credentials Which of the following solutions would meet...

November 6, 2021 No Comments READ MORE +

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?

Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A

November 6, 2021 No Comments READ MORE +