In which of the following situations would it be BEST to use a detective control type for mitigation?

In which of the following situations would it be BEST to use a detective control type for mitigation?A . A company implemented a network load balancer to ensure 99.999% availability of its web application.B . A company designed a backup solution to increase the chances of restoring services in case...

October 31, 2021 No Comments READ MORE +

Which of the following MOST likely occurred?

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site Upon investigation, a security analyst the identifies the following: • The legitimate websites IP address is 10.1.1.20 and eRecruit local resolves to the IP • The forged...

October 31, 2021 No Comments READ MORE +

Which of the following network attacks is the researcher MOST likely experiencing?

A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message: Which of the following...

October 31, 2021 No Comments READ MORE +

Which of the following attacks MOST likely occurred on the original DNS server?

An organization’s help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists....

October 30, 2021 No Comments READ MORE +

Which of the following will BEST ensure the site’s users are not compromised after the reset?

To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?A . A password reuse policyB . Account lockout after three failed attemptsC . Encrypted credentials in...

October 30, 2021 No Comments READ MORE +

Which of the following technologies are being utilized to provide these capabilities?

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies...

October 30, 2021 No Comments READ MORE +

Which of the following steps should also be taken to harden the smart switch?

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The...

October 30, 2021 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...

October 30, 2021 No Comments READ MORE +

Which of the following should the IT administrator do FIRST after recovery?

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do...

October 30, 2021 No Comments READ MORE +

Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to...

October 30, 2021 No Comments READ MORE +