Which of the following should be MOST concerning to the company?
A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?A . Privacy B. Cloud storage of telemetry data C. GPS spoofing D. Weather eventsView AnswerAnswer: A Explanation: The use of a drone for perimeter and boundary monitoring can...
A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?
A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?A . Containment B. Identification C. Recovery D. PreparationView AnswerAnswer: B Explanation: Vulnerability scanning is a proactive...
Which of the following would BEST allow this objective to be met?
The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?A . Requiring all new, on-site visitors to configure their...
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?A . Tabletop B. Parallel C. Full interruption D. SimulationView AnswerAnswer: A Explanation: A tabletop exercise is a type of disaster recovery test that simulates a disaster scenario in a discussion-based format, without actually...
Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?
Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?A . Test B. Staging C. Development D. ProductionView AnswerAnswer: A Explanation: The test environment is used to assess...
Which of the following is the administrator MOST likely trying to do?
When planning to build a virtual environment, an administrator need to achieve the following, • Establish polices in Limit who can create new VMs • Allocate resources according to actual utilization‘ • Require justification for requests outside of the standard requirements. • Create standardized categories based on size and resource...
Which of the following types of attacks has occurred?
After a phishing scam fora user's credentials, the red team was able to craft payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which of the following types of attacks has occurred?A . Privilege escalation B. Session replay C....
Which f the following configuration should an analysis enable To improve security?
A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which f the following configuration should an analysis enable To improve security? (Select TWO.) A. RADIUS B. PEAP C. WPS D. WEP-EKIP E. SSL F. WPA2-PSKView AnswerAnswer: A,...
Which of the following should the company Implement to prevent this type of attack from occurring in the future?
A company recently experienced an attack during which 5 main website was directed to the atack-er’s web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following should the company Implement to prevent this type of attack from occurring in the future?A . IPsec B. SSL/TLS...
Which of the following is needed to meet the objective?
A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?A . A reverse proxy B. A decryption certificate C. A spill-tunnel VPN D. Load-balanced serversView AnswerAnswer: B Explanation: A Web Application Firewall...