Which of the following would MOST likely have prevented this breach?

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area . Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD ....

July 17, 2021 No Comments READ MORE +

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?A . highest to lowest sequence numberB . nonsequential orderC . deterministic orderD . lowest to highest sequence numberView...

July 17, 2021 No Comments READ MORE +

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?

A network administrator is configuring a centralized control policy based on match action pairs for multiple conditions, which order must be configured to prefer Prefix List over TLOC and TLOC over Origin?A . highest to lowest sequence numberB . nonsequential orderC . deterministic orderD . lowest to highest sequence numberView...

July 17, 2021 No Comments READ MORE +

Which of the following should the analyst recommend be enabled?

An attacker is attempting, to harvest user credentials on a client's website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password. the logon screen displays the following message: Which of the following should the analyst recommend be enabled?A...

July 17, 2021 No Comments READ MORE +

Which of the following controls should the company consider using as part of its IAM strategy?

A nationwide company is experiencing unauthorized logins at all hours of the day. The logins appear to originate from countries in which the company has no employees . Which of the following controls should the company consider using as part of its IAM strategy? (Select TWO).A . A complex password...

July 16, 2021 No Comments READ MORE +

The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.

The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port. Instructions: The firewall will process the rules in a top-down manner in order as a first match. The port number must be typed in and only one port number can...

July 16, 2021 No Comments READ MORE +

Which of the following would BEST meet the architect's objectives?

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent,...

July 16, 2021 No Comments READ MORE +

The administrator is given the following, requirements?

A network administrator has been asked to design a solution to improve a company's security posture. The administrator is given the following, requirements? • The solution must be inline in the network • The solution must be able to block known malicious traffic • The solution must be able to...

July 16, 2021 No Comments READ MORE +

Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?

A security analyst has been reading about a newly discovered cyber attack from a known threat actor . Which of the following would BEST support the analyst's review of the tactics, techniques, and protocols the threat actor was observed using in previous campaigns?A . Security research publicationsB . The MITRE...

July 16, 2021 No Comments READ MORE +

Which of the following BEST describes the type of attack that is occurring?

Given the following logs: Which of the following BEST describes the type of attack that is occurring?A . Rainbow tableB . DictionaryC . Password sprayingD . Pass-the-hashView AnswerAnswer: C

July 15, 2021 No Comments READ MORE +