Which of the following plans is the organization MOST likely developing?

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?A . Incident responseB . CommunicationsC . Disaster recoveryD . Data retentionView AnswerAnswer: C

August 16, 2021 No Comments READ MORE +

Which of the following would MOST likely show where the malware originated?

A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?A . The DNS logsB . The...

August 15, 2021 No Comments READ MORE +

Which of the following log sources would be BEST to show the source of the unusual traffic?

A security administrator has noticed unusual activity occurring between different global instances and workloads and needs to identify the source of the unusual traffic. Which of the following log sources would be BEST to show the source of the unusual traffic?A . HIDSB . UEBAC . CASBD . VPCView AnswerAnswer:...

August 15, 2021 1 Comment READ MORE +

Which of the following should the analyst implement to authenticate the entire packet?

A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?A . AHB . ESPC . SRTPD . LDAPView AnswerAnswer: B

August 15, 2021 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

August 15, 2021 No Comments READ MORE +

Which of the following methods would BEST accomplish this goal?

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB ....

August 15, 2021 No Comments READ MORE +

Which of the following would be BEST to solve this issue?

A network engineer notices the VPN concentrator overloaded and crashes on days when there are a lot of remote workers. Senior management has placed greater importance on the availability of VPN resources for the remote workers than the security of the end users’ traffic. Which of the following would be...

August 15, 2021 No Comments READ MORE +

Which of the following should the CISO read and understand before writing the policies?

A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing. Which of the following should the CISO read and understand before writing the policies?A . PCI DSSB . GDPRC . NISTD . ISO 31000View AnswerAnswer: B

August 15, 2021 No Comments READ MORE +

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC ....

August 15, 2021 No Comments READ MORE +

Which of the following MOST likely occurred?

A company uses specially configured workstations tor any work that requires administrator privileges to its Tier 0 and Tier 1 systems. The company follows a strict process to harden systems immediately upon delivery. Even with these strict security measures in place, an incident occurred from one of the workstations. The...

August 14, 2021 No Comments READ MORE +