Which of the following methods would BEST prevent data?
A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent data? (Select TWO)A . VPNB . Drive encryptionC . Network firewallD . File-level encryptionE . USB blockerF . MFAView AnswerAnswer: B,E
Which of the following is the analyst MOST likely seeing?
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option...
Which of the following components forwards the logs to a central source?
A company was recently breached Part of the company's new cybersecurity strategy is to centralize the logs from all security devices Which of the following components forwards the logs to a central source?A . Log enrichment B Log aggregationB . Log parserC . Log collectorView AnswerAnswer: C
Which of the following recommendations would BEST address the CSO’s concern?
A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed FDD...
Which of the following tools should the analyst use?
A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers Which of the following tools should the analyst use?A . netstatB . net shareC . netcatD . nbtstatE . net sessionView AnswerAnswer: A
Which of the following should the analyst implement to authenticate the entire packet?
A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?A . AHB . ESPC . SRTPD . LDAPView AnswerAnswer: B
When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....
Which of the following should administrator implement to protect the environment from this malware?
Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the...
Which of the following sources would reveal if the CEO's personal information is for sale?
A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?A . Automated information sharingB . Open-source intelligenceC . The dark webD . Vulnerability databasesView AnswerAnswer: C
Which of the following technologies should the IT manager use when implementing MFA?
A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C