Which of the following is the MOST likely cause of this issue?

A network engineer is troubleshooting wireless network connectivity issues that were reported by users. The issues are occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow speeds when accessing websites and are unable to connect to network drives. The...

July 22, 2021 No Comments READ MORE +

Which of the following algorithms has the SMALLEST key size?

Which of the following algorithms has the SMALLEST key size?A . DESB . TwofishC . RSAD . AESView AnswerAnswer: B

July 22, 2021 1 Comment READ MORE +

Which of the following attacks was MOST likely used?

A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours . Which of the following attacks was MOST likely used?A...

July 22, 2021 No Comments READ MORE +

Which of the following is the BEST defense against this scenario?

A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots . Which of the following is the BEST defense against this scenario?A . Configuring signature-based...

July 21, 2021 No Comments READ MORE +

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B

July 21, 2021 No Comments READ MORE +

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?A . A right-to-audit clause allowing for annual security auditsB . Requirements for event logs to be kept for a minimum of 30 daysC . Integration of...

July 21, 2021 No Comments READ MORE +

Which of the following would be BEST for the security manager to use in a threat mode?

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company’s Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks. Which of the following would be BEST for the security manager to use...

July 21, 2021 No Comments READ MORE +

Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague . Which of the following is the FIRST step the senior colleague will most...

July 20, 2021 No Comments READ MORE +

Which of the following would be BEST to use to accomplish the task?

A security analyst is performing a packet capture on a series of SOAP HTTP requests for a security assessment. The analyst redirects the output to a file After the capture is complete, the analyst needs to review the first transactions quickly and then search the entire series of requests for...

July 20, 2021 No Comments READ MORE +

Which of the following techniques BEST explains this action?

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string . Which of the following techniques BEST explains this action?A . PredictabilityB . Key stretchingC . SaltingD . HashingView AnswerAnswer: C

July 20, 2021 No Comments READ MORE +