Which of the following should the analyst implement to authenticate the entire packet?
A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet . Which of the following should the analyst implement to authenticate the entire packet?A . AHB . ESPC . SRTPD . LDAPView AnswerAnswer: B
In which of the following common use cases would steganography be employed?
In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A
Which of the following would be BEST to help the organization’s executives determine the next course of action?
A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization’s executives determine the next course of action?A . An incident response planB . A communications planC . A disaster recovery planD...
Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?
Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C
From which of the following did the alert MOST likely originate?
A security analyst has received an alert about being sent via email. The analyst’s Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care. From which of the following did the alert MOST likely originate?A . S/MIMEB . DLPC . IMAPD . HIDSView...
Which of the following would be the MOST acceptable?
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A
Which of the following describes the ability of code to target a hypervisor from inside
Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B
Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?
Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?A . Data encryptionB . Data maskingC . AnonymizationD . TokenizationView AnswerAnswer: A
Which of the following attack vectors was MOST likely used in this scenario?
A user contacts the help desk to report the following: ✑ Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested. ✑ The user was...
Which of the following methods would BEST prevent the exfiltration of data?
A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).A . VPNB . Drive encryptionC . Network firewallD . File level encryptionE . USB blockerF . MFAView...