Which of the following should the technician do to validate the authenticity of the email?

A help desk technician receives an email from the Chief Information Officer (C/O) asking for documents. The technician knows the CIO is on vacation for a few weeks. Which of the following should the technician do to validate the authenticity of the email?A . Check the metadata in the email...

July 18, 2023 No Comments READ MORE +

Which of the following would be BEST for the analyst to perform?

A security analyst is responding to an alert from the SIEM. The alert states that malware was discovered on a host and was not automatically deleted. Which of the following would be BEST for the analyst to perform?A . Add a deny-all rule to that host in the network ACL...

July 18, 2023 No Comments READ MORE +

Which of the following biometric authentication methods is the MOST accurate?

Which of the following biometric authentication methods is the MOST accurate?A . Gait B. Retina C. Signature D. VoiceView AnswerAnswer: B Explanation: Retina authentication is the most accurate biometric authentication method. Retina authentication is based on recognizing the unique pattern of blood vessels and other features in the retina. This...

July 18, 2023 No Comments READ MORE +

An information security manager for an organization is completing a PCI DSS self-assessment for the first time. which of the is following MOST likely reason for this type of assessment?

An information security manager for an organization is completing a PCI DSS self-assessment for the first time. which of the is following MOST likely reason for this type of assessment?A . An international expansion project is currently underway. B. Outside consultants utilize this tool to measure security maturity. C. The...

July 17, 2023 No Comments READ MORE +

Which of the following types of malware is MOST likely infecting the hosts?

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?A . A RAT B. Ransomware...

July 17, 2023 No Comments READ MORE +

Which of the following is the FINAL step to be performed prior to promoting to production?

A systems engineer is building a new system for production. Which of the following is the FINAL step to be performed prior to promoting to production?A . Disable unneeded services. B. Install the latest security patches. C. Run a vulnerability scan. D. Encrypt all disks.View AnswerAnswer: C Explanation: Running a...

July 17, 2023 No Comments READ MORE +

Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?

The technology department at a large global company is expanding its Wi-Fi network infrastructure at the headquarters building. Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?A . Authentication protocol B. Encryption type C. WAP placement D. VPN configurationView AnswerAnswer: C Explanation: WAP...

July 17, 2023 No Comments READ MORE +

Which of the following environments typically hosts the current version configurations and code, compares user-story responses and workflow, and uses a modified version of actual data for testing?

Which of the following environments typically hosts the current version configurations and code, compares user-story responses and workflow, and uses a modified version of actual data for testing?A . Development B. Staging C. Production D. TestView AnswerAnswer: B Explanation: Staging is an environment in the software development lifecycle that is...

July 17, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause?

A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?A . A new firewall rule is needed to access the application. B. The...

July 17, 2023 No Comments READ MORE +

Which of the following BEST describes what is happening?

During a Chief Information Security Officer (CISO) convention to discuss security awareness, the attendees are provided with a network connection to use as a resource. As the convention progresses, one of the attendees starts to notice delays in the connection, and the HIIPS site requests are reverting to HTTP. Which...

July 17, 2023 No Comments READ MORE +