Which of the following BEST describes the configurations the attacker exploited?
An attacker was easily able to log in to a company's security camera by performing a basic online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?A . Weak encryptionB . Unsecure protocolsC . Default settingsD...
A security engineer is setting up passwordless authentication for the first time
DRAG DROP A security engineer is setting up passwordless authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation,...
Which of the following would be BEST to mitigate CEO’s concern?
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from...
Which of the following should the administrator use?
A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?A . SDPB . AAAC . IaaSD . MSSPE . MicroservicesView AnswerAnswer:...
Which of the following will the analyst MOST likely consult to validate which platforms have been affected?
A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?A . OSINTB . SIEMC . CVSSD . CVEView AnswerAnswer: D
Which of the following are the BEST options to accomplish this objective'?
An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select...
Which of the following should the security team do to prevent this from Happening in the future?
An organization blocks user access to command-line interpreters but hackers still managed to invoke the interpreters using native administrative tools. Which of the following should the security team do to prevent this from Happening in the future?A . Implement HIPS to block Inbound and outbound SMB ports 139 and 445.B...
Which of the following must be less than 12 hours to maintain a positive total cost of ownership?
A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?A . MTBFB . RPOC...
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?A . To provide data to quantity risk based on the organization's systems.B . To keep all software and hardware fully patched for known vulnerabilitiesC...
Which of the following BEST describes the type of password attack the attacker is performing?
An attacker has successfully exfiltrated several non-salted password hashes from an online system. Given the logs below: Which of the following BEST describes the type of password attack the attacker is performing?A . DictionaryB . Pass-the-hashC . Brute-forceD . Password sprayingView AnswerAnswer: A