Which of the following attacks was successfully implemented based on the output?

A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output: Which of the following attacks was successfully implemented based on the output?A . Memory leakB . Race conditionsC . SQL injectionD . Directory...

August 12, 2021 No Comments READ MORE +

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrixB . Risk toleranceC . Risk registerD . Risk appetiteView AnswerAnswer: B

August 12, 2021 No Comments READ MORE +

Which of the following should administrator implement to protect the environment from this malware?

Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the...

August 12, 2021 No Comments READ MORE +

Which of the following BEST describes the attack that was attempted against the forum readers?

An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?A . SOU attackB . DLL...

August 12, 2021 No Comments READ MORE +

Which of the following should be implemented to prevent similar situations in the future?

Several large orders of merchandise were recently purchased on an e-commerce company's website. The totals for each of the transactions were negative values, resulting in credits on the customers' accounts. Which of the following should be implemented to prevent similar situations in the future?A . Ensure input validation is in...

August 12, 2021 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

August 11, 2021 No Comments READ MORE +

Which of the following is being used?

To further secure a company’s email system, an administrator is adding public keys to DNS records in the company’s domain. Which of the following is being used?A . PFSB . SPFC . DMARCD . DNSSECView AnswerAnswer: D

August 11, 2021 No Comments READ MORE +

Which of the following should the analyst disable to enhance the access point security?

Accompany deployed a WiFi access point in a public area and wants to harden the configuration to make it more secure. After performing an assessment, an analyst identifies that the access point is configured to use WPA3, AES, WPS, and RADIUS. Which of the following should the analyst disable to...

August 11, 2021 No Comments READ MORE +

Which of the following describes the ability of code to target a hypervisor from inside

Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B

August 11, 2021 No Comments READ MORE +

Which of the following BEST describes this kind of attack?

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server: Which of the following BEST describes this kind of attack?A . Directory traversalB . SQL injectionC . APID . Request forgeryView AnswerAnswer: D

July 24, 2021 No Comments READ MORE +