Which of the following resiliency techniques was applied to the network to prevent this attack?

A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted. Which of the following resiliency techniques was applied to the network to prevent this attack?A . NIC TeamingB . Port mirroringC...

August 25, 2021 No Comments READ MORE +

Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

August 25, 2021 No Comments READ MORE +

Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

August 25, 2021 No Comments READ MORE +

Which of the following did the administrator MOST likely configure that will assist the investigators?

A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident. The systems administrator has Just informed investigators that other log files are available for review. Which of the following did the administrator...

August 25, 2021 No Comments READ MORE +

Which of the following is the attacker exploiting?

An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?A . Zero-dayB . Default permissionsC . Weak encryptionD . Unsecure root accountsView AnswerAnswer: A

August 25, 2021 No Comments READ MORE +

Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?

Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?A . TabletopB . ParallelC . Full interruptionD . SimulationView AnswerAnswer: D

August 25, 2021 No Comments READ MORE +

Which of the following BEST describes what the company should purchase to ensure its critical servers and network devices stay online?

A company has been experiencing very brief power outages from its utility company over the last few months. These outages only last for one second each time. The utility company is aware of the issue and is working to replace a faulty transformer. Which of the following BEST describes what...

August 24, 2021 No Comments READ MORE +

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . Included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer: A,D

August 24, 2021 No Comments READ MORE +

Which of the following biometrics will MOST likely be used, without the need for enrollment?

An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to...

August 24, 2021 No Comments READ MORE +

Which of the following BEST describes the tasks the developer is conducting?

A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A

August 24, 2021 1 Comment READ MORE +