Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?A . PCI...

August 21, 2021 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

August 21, 2021 No Comments READ MORE +

Which of the following recommendations would BEST prevent this from reoccurring?

A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would...

August 21, 2021 No Comments READ MORE +

Which of the following demonstrates what the administrator is providing?

After entering a username and password, and administrator must gesture on a touch screen. Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D

August 21, 2021 No Comments READ MORE +

Which of the following BEST represents the type of testing that will occur?

An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?A . Bug bountyB . Black-boxC...

August 20, 2021 No Comments READ MORE +

Which of the following steps would be best for the security engineer to take NEXT?

A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output: Which of the following steps would be best for the security engineer...

August 20, 2021 No Comments READ MORE +

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?A . A right-to-audit clause allowing for annual security auditsB . Requirements for event logs to be kept for a minimum of 30 daysC . Integration of...

August 20, 2021 No Comments READ MORE +

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?

Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?A . An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.B . An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying...

August 20, 2021 No Comments READ MORE +

Which of the following stages of the incident response process is this an example of?

A security operations analyst is using the company's SIEM solution to correlate alerts. Which of the following stages of the incident response process is this an example of?A . EradicationB . RecoveryC . IdentificationD . PreparationView AnswerAnswer: C

August 20, 2021 No Comments READ MORE +

When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?

When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?A . 2-Wave compatibilityB . Network rangeC . Zigbee configurationD . Communication protocolsView AnswerAnswer: D

August 20, 2021 1 Comment READ MORE +