Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...

June 6, 2021 No Comments READ MORE +

Which of the following is MOST likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?

Which of the following is MOST likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?A . An RTO reportB...

June 6, 2021 No Comments READ MORE +

Which of the following can the security analyst conclude?

A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. The security...

June 6, 2021 No Comments READ MORE +

Which of the following types of attack is MOST likely being conducted?

A security analyst is reviewing the output of a web server log and notices a particular account is attempting to transfer large amounts of money: Which of the following types of attack is MOST likely being conducted?A . SQLiB . CSRFC . Session replayD . APIView AnswerAnswer: C

June 6, 2021 No Comments READ MORE +

Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD ....

June 5, 2021 2 Comments READ MORE +

Which of the following targeted the organization?

An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled. Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D

June 5, 2021 No Comments READ MORE +

Which of the following attacks MOST likely occurred?

A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst...

June 5, 2021 1 Comment READ MORE +

Which of the following attacks is MOST likely being detected?

A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of...

June 5, 2021 No Comments READ MORE +

Which of the following should the technician do to maintain chain of custody?

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?A . Document the collection and require a sign-off when possession changes.B . Lock the device in a safe or other secure location to prevent theft or...

June 4, 2021 No Comments READ MORE +

Which of the following BEST describes the type of testing the user should perform?

A user is concerned that a web application will not be able to handle unexpected or random input without crashing. Which of the following BEST describes the type of testing the user should perform?A . Code signingB . FuzzingC . Manual code reviewD . Dynamic code analysisView AnswerAnswer: D

June 4, 2021 No Comments READ MORE +