Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?
Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C
Which of the following MDM configurations must be considered when the engineer travels for business?
An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?A . Screen locksB . Application managementC . GeofencingD . ContainerizationView AnswerAnswer: D
Which of the following should the administrator employ to meet these criteria?
A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. The users must also be protected because many of them work from home or at remote locations, providing...
Which of the following BEST describes the type of testing the user should perform?
A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?A . Code signingB . FuzzingC . Manual code reviewD . Dynamic code analysisView AnswerAnswer: D
Which of the following BEST describes the attack that was attempted against the forum readers?
An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...
Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should...
Which of the following types of service providers is being used?
A Chief Executive Officer (CEO) is dissatisfied with the level of service from the company's new service provider. The service provider is preventing the CEO. from sending email from a work account to a personal account. Which of the following types of service providers is being used?A . Telecommunications service...
Which of the following can be determined about the organization's public presence and security posture?
Joe. a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output: Which of the following can be determined about the organization's public presence and security posture? (Select TWO).A . Joe...
Which of the following is the BEST defense against this scenario?
A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?A . Configuring signature-based antivirus...
A security engineer is setting up passwordless authentication for the first time
DRAG DROP A security engineer is setting up passwordless authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation,...