Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

May 30, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the CRO’s concerns?

The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed....

May 30, 2021 No Comments READ MORE +

Which of the following steps should the analyst perform to meet these requirements?

A security analyst Is hardening a Linux workstation and must ensure It has public keys forwarded to remote systems for secure login Which of the following steps should the analyst perform to meet these requirements? (Select TWO).A . Forward the keys using ssh-copy-id.B . Forward the keys using scp.C ....

May 30, 2021 No Comments READ MORE +

Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?

Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?A . Stored proceduresB . Buffer overflowsC . Data biasD . Code reuseView AnswerAnswer: C Explanation: https://lionbridge.ai/articles/7-types-of-data-bias-in-machine-learning/

May 30, 2021 No Comments READ MORE +

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:

An organization that is located in a flood zone is MOST likely to document the concerns associated with the restoration of IT operation in a:A . business continuity planB . communications plan.C . disaster recovery plan.D . continuity of operations planView AnswerAnswer: C

May 29, 2021 No Comments READ MORE +

Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?

An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way...

May 29, 2021 No Comments READ MORE +

Which of the following BEST describes this type of email?

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize. Which of the following BEST describes this type of email?A ....

May 29, 2021 No Comments READ MORE +

Which of the following would MOST likely cause a data breach?

The website http://companywebsite.com requires users to provide personal Information, Including security question responses, for registration. Which of the following would MOST likely cause a data breach?A . Lack of input validationB . Open permissionsC . Unsecure protocolD . Missing patchesView AnswerAnswer: C

May 28, 2021 No Comments READ MORE +

Which of the following should the administrator use?

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?A . ddB . chmodC . dnsenumD . loggerView AnswerAnswer: A

May 28, 2021 No Comments READ MORE +

Which of the following must the administrator configure to meet this requirement?

A cloud administrator is configuring five compute instances under the same subnet in a VPC Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this...

May 28, 2021 No Comments READ MORE +