Which of the following concepts does this BEST represent?

Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. Which of the following concepts does this BEST represent?A . Functional testing B. Stored procedures C. Elasticity D. Continuous integrationView AnswerAnswer: D Explanation: Continuous integration is a software development practice where...

August 22, 2023 No Comments READ MORE +

Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a workaround to protect the servers?

A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned tf servers in the company's DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the...

August 22, 2023 No Comments READ MORE +

Which of the following must be in place before implementing a BCP?

Which of the following must be in place before implementing a BCP?A . SLA B. AUP C. NDA D. BIAView AnswerAnswer: D Explanation: A Business Impact Analysis (BIA) is a critical component of a Business Continuity Plan (BCP). It identifies and prioritizes critical business functions and determines the impact of...

August 22, 2023 No Comments READ MORE +

Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).

Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).A . Page files B. Event logs C. RAM D. Cache E. Stored files F. HDDView AnswerAnswer: C, D Explanation: In a forensic investigation, volatile data should be collected first, based on...

August 22, 2023 No Comments READ MORE +

Which of the following attacks is being conducted?

A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. Upon further investigation, the analyst notices that successful login attempts are being conducted with impossible travel times during...

August 22, 2023 No Comments READ MORE +

Which of the following does this example describe?

A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?A . laC B. MSSP C. Containers D. SaaSView AnswerAnswer: A Explanation: laaS (Infrastructure as a Service) allows the...

August 21, 2023 No Comments READ MORE +

Which of the following types of malware is MOST likely infecting the hosts?

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?A . A RAT B. Ransomware...

August 21, 2023 No Comments READ MORE +

Which of the following should the engineer implement?

A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?A . An air gap B. A hot site C. A VUAN D. A screened subnetView AnswerAnswer: D Explanation: A screened subnet...

August 21, 2023 No Comments READ MORE +

Which of the following is the researcher MOST likely using?

A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. Which of the following is the researcher MOST likely using?A . The Diamond Model of Intrusion Analysis B. The Cyber Kill Chain C. The MITRE CVE database D. The incident...

August 21, 2023 No Comments READ MORE +

Which of the following would produce the closet experience of responding to an actual incident response scenario?

Which of the following would produce the closet experience of responding to an actual incident response scenario?A . Lessons learned B. Simulation C. Walk-through D. TabletopView AnswerAnswer: B Explanation: A simulation exercise is designed to create an experience that is as close as possible to a real-world incident response scenario....

August 21, 2023 No Comments READ MORE +