Which of the following will the engineer MOST likely use to achieve this objective?

A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and are unable to support the addition of MFA, Which of the following will the engineer MOST likely use to achieve this...

August 20, 2023 No Comments READ MORE +

Which of the following recovery solutions would be the BEST option to meet these requirements?

A systems administrator is considering different backup solutions for the IT infrastructure. The company is looking for a solution that offers the fastest recovery time while also saving the most amount of storage used to maintain the backups. Which of the following recovery solutions would be the BEST option to...

August 19, 2023 No Comments READ MORE +

Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?

A company would like to provide flexibility for employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?A ....

August 19, 2023 No Comments READ MORE +

Which of the following should the manager use to control the network traffic?

After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?A . A DMZ B. A VPN a C. A VLAN D. An ACLView AnswerAnswer: D Explanation: After segmenting the network, a network...

August 19, 2023 No Comments READ MORE +

To which of the following groups should the analyst report this real-world event?

The SIEM at an organization has detected suspicious traffic coming a workstation in its internal network. An analyst in the SOC the workstation and discovers malware that is associated with a botnet is installed on the device A review of the logs on the workstation reveals that the privileges of...

August 19, 2023 No Comments READ MORE +

Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?

Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?A . Production B. Test C. Staging D. DevelopmentView AnswerAnswer: D Explanation: A development environment is the environment that...

August 19, 2023 No Comments READ MORE +

Which of the following security solutions would mitigate the risk of future data disclosures?

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would...

August 19, 2023 No Comments READ MORE +

Which of the following is the security analyst MOST likely observing?

While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches. Which of the following is the security analyst MOST likely observing?A . SNMP traps B. A Telnet session C. An SSH connection D. SFTP trafficView AnswerAnswer: B...

August 19, 2023 No Comments READ MORE +

Which of the following roles would MOST likely include these responsibilities?

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?A . Data protection officer B. Data owner C. Backup administrator D. Data...

August 18, 2023 No Comments READ MORE +

Which of the following MOST likely would have prevented the attacker from learning the service account name?

A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation: Which of the following MOST likely would have prevented the attacker from learning the service account name?A . Race condition testing B....

August 18, 2023 No Comments READ MORE +