Which of the following account policies would BEST prevent this type of attack?

A workwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil. Which of the following account policies would BEST prevent this type of attack?A ....

November 6, 2021 No Comments READ MORE +

Which of the following social-engineering techniques is the attacker using?

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which of the following social-engineering...

November 5, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the CRO’s concerns?

The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed....

November 5, 2021 No Comments READ MORE +

Which of the following implementations would be BEST to prevent the issue from reoccurring?

A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent the issue from reoccurring?A . CASBB . SWGC...

November 5, 2021 No Comments READ MORE +

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

Which of the following cloud models provides clients with servers, storage, and networks but nothing else?A . SaaSB . PaaSC . IaaSD . DaaSView AnswerAnswer: C

November 5, 2021 No Comments READ MORE +

Which of the following should the company implement to BEST prevent this from occurring?

A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute...

November 5, 2021 No Comments READ MORE +

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:A . business continuity planB . communications plan.C . disaster recovery plan.D . continuity of operations planView AnswerAnswer: C

November 5, 2021 No Comments READ MORE +

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?A . MOUB . MTTRC . SLAD . NDAView AnswerAnswer: C Explanation: Service level agreement (SLA). An SLA is an agreement between a company...

November 5, 2021 No Comments READ MORE +

Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option...

November 5, 2021 No Comments READ MORE +

Which of the following control types is an IDS?

A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?A . CorrectiveB . PhysicalC . DetectiveD . AdministrativeView AnswerAnswer: C Explanation: IDS = Intrusion Detection System. It is passive and only notifies instead...

November 5, 2021 No Comments READ MORE +