Which of the following cloud models would BEST meet the needs of the organization?

To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving . Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . laaSC . SaaSD...

July 15, 2021 No Comments READ MORE +

Which of the following did the assessment identify?

A security assessment determines DES and 3DES at still being used on recently deployed production servers . Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D

July 15, 2021 No Comments READ MORE +

Which erf the following attacks in happening on the corporate network?

A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of...

July 14, 2021 No Comments READ MORE +

Which of the following types of controls should be used to reduce the risk created by this scenario?

A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard . Which of the following types...

July 14, 2021 No Comments READ MORE +

Which of the following attacks has occurred?

A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, while reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...

July 14, 2021 No Comments READ MORE +

Which of the following technologies will the coffee shop MOST likely use in place of PSK?

A local coffee shop runs a small WiFi hot-spot for its customers that utilizes WPA2-PSK. The coffee shop would like to stay current with security trends and wants to implement WPA3 to make its WiFi even more secure . Which of the following technologies will the coffee shop MOST likely...

July 14, 2021 No Comments READ MORE +

Which of the following is the BEST approach to implement the desired solution?

A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution but instead wants to rely on the authorization provided by another platform . Which of the following is the BEST approach to implement the desired solution?A . OAuthB...

July 14, 2021 No Comments READ MORE +

Which of the following would be BEST to mitigate CEO’s concern?

The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from...

July 14, 2021 No Comments READ MORE +

Which of the following would BEST assist the company?

A small company that does not have security staff wants to improve its security posture . Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B

July 14, 2021 No Comments READ MORE +

Which of the following log sources would be BEST to show the source of the unusual traffic?

A security administrator has noticed unusual activity occurring between different global instances and workloads and needs to identify the source of the unusual traffic . Which of the following log sources would be BEST to show the source of the unusual traffic?A . HIDSB . UEBAC . CASBD . VPCView...

July 14, 2021 No Comments READ MORE +