Which of the following can block an attack at Layer 7?

A cybersecurity administrator needs to implement a Layer 7 security control on a network and block potential attacks. Which of the following can block an attack at Layer 7? (Select TWO).A . HIDSB . NIPSC . HSMD . WAFE . NACF . NIDSG . Stateless firewallView AnswerAnswer: DF Explanation: A...

January 5, 2024 No Comments READ MORE +

As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security?

A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).A . Create a new network for...

January 5, 2024 No Comments READ MORE +

Which of the following is needed to meet the objective?

A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?A . A reverse proxyB . A decryption certificateC . A spill-tunnel VPND . Load-balanced serversView AnswerAnswer: B Explanation: A Web Application Firewall...

January 5, 2024 No Comments READ MORE +

Which of the following would produce the closet experience of responding to an actual incident response scenario?

Which of the following would produce the closet experience of responding to an actual incident response scenario?A . Lessons learnedB . SimulationC . Walk-throughD . TabletopView AnswerAnswer: B Explanation: A simulation exercise is designed to create an experience that is as close as possible to a real-world incident response scenario....

January 5, 2024 No Comments READ MORE +

Which of the following roles would MOST likely include these responsibilities?

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?A . Data protection officerB . Data ownerC . Backup administratorD . Data...

January 5, 2024 No Comments READ MORE +

Which of the following should the analyst use?

A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic. Which of the following should the analyst use?A . opensslB . hpingC . netcatD . tcpdumpView AnswerAnswer: A Explanation: To verify that a client-server (non-web) application is sending encrypted traffic, a security analyst can use...

January 5, 2024 No Comments READ MORE +

Which of the following is MOST likely the cause?

A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?A . A new firewall rule is needed to access the application.B . The...

January 5, 2024 No Comments READ MORE +

Which of the following should the organization consult for the exact requirements for the cloud provider?

An organization would like to remediate the risk associated with its cloud service provider not meeting its advertised 99.999% availability metrics. Which of the following should the organization consult for the exact requirements for the cloud provider?A . SLAB . BPAC . NDAD . MOUView AnswerAnswer: A Explanation: The Service...

January 5, 2024 No Comments READ MORE +

Which of the following will this enable?

The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Chief Information Security Officer to federate user digital identities using SAML-based protocols. Which of the following will this enable?A . SSOB . MFAC . PKID . OLPView AnswerAnswer: A Explanation: Federating user digital identities using...

January 5, 2024 No Comments READ MORE +

Which of the following is MOST likely the issue?

A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when writing documents and the mouse pointer occasional disappears. The task list shows the following results Which of the following is MOST likely the issue?A . RATB . PUPC . SpywareD . KeyloggerView AnswerAnswer: C Explanation:...

January 4, 2024 No Comments READ MORE +