Which of the following actions should the network team take NEXT?

The help desk has received calls from users in multiple locations who are unable to access core network services The network team has identified and turned off the network switches using remote commands. Which of the following actions should the network team take NEXT? A. Disconnect all external network connections...

July 10, 2023 No Comments READ MORE +

Which of the following BEST describes the team that acts as a referee during a penetration-testing exercise?

Which of the following BEST describes the team that acts as a referee during a penetration-testing exercise?A . White team B. Purple team C. Green team D. Blue team E. Red teamView AnswerAnswer: A Explanation: During a penetration testing exercise, the white team is responsible for acting as a referee...

July 9, 2023 No Comments READ MORE +

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls.

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls. This is an example of:A . prepending. B. an influence campaign. C. a watering-hole attack. D. intimidation. E. information elicitation.View AnswerAnswer: B...

July 9, 2023 No Comments READ MORE +

Which of the following attacks occurred?

During a forensic investigation, a security analyst discovered that the following command was run on a compromised host: Which of the following attacks occurred?A . Buffer overflow B. Pass the hash C. SQL injection D. Replay attackView AnswerAnswer: B Explanation: Pass the hash is an attack technique that allows an...

July 9, 2023 No Comments READ MORE +

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?A . Hashing B. DNS sinkhole C. TLS inspection D. Data maskingView AnswerAnswer: C Explanation: an IDS (Intrusion Detection System) and a WAF (Web Application Firewall) are both used to monitor...

July 9, 2023 No Comments READ MORE +

Which of the following should the organization employ to meet this requirement?

An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?A . SOAP B. SAML C. SSO D. KerberosView AnswerAnswer: C Explanation: Single Sign-On (SSO) is a mechanism that allows users to access multiple applications with a single set of login...

July 9, 2023 No Comments READ MORE +

A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss.

A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategyA . Incremental backups followed by differential backups B....

July 9, 2023 No Comments READ MORE +

Which of the following is MOST capable of accomplishing both tasks?

The security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted files. The analyst has been tasked with determining the infringing source machine and instructed to...

July 9, 2023 No Comments READ MORE +

Which of the following control types does this BEST represent?

A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?A . Preventive B. Compensating C. Corrective D. DetectiveView AnswerAnswer: D Explanation: A SIEM is a security solution that helps detect security incidents by...

July 9, 2023 No Comments READ MORE +

Which of the following is needed to meet the objective?

A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?A . A reverse proxy B. A decryption certificate C. A spill-tunnel VPN D. Load-balanced serversView AnswerAnswer: B Explanation: A Web Application Firewall...

July 9, 2023 No Comments READ MORE +