Which of the following constraints BEST describes the reason the findings cannot be remediated?
A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business. Which of the following constraints BEST describes the reason the findings cannot be remediated?A . inability to authenticate B. Implied...
Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?
A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the...
Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?
Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?A . RTO B. MTBF C. MTTR D. RPOView AnswerAnswer: C Explanation: Mean Time To Repair (MTTR) is a maintenance metric that measures the average time required to troubleshoot and restore...
Which of the following would BEST allow this objective to be met?
The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?A . Requiring all new, on-site visitors to configure their...
Which of the following network appliances can achieve this goal?
An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?A . HSM B. CASB C. TPM D. DLPView AnswerAnswer: A Explanation: Hardware Security Module (HSM) is a network appliance designed to securely store cryptographic keys and perform cryptographic operations....
Which of the following Is the BEST solution for the pilot?
The Chief Information Security Officer wants to pilot a new adaptive, user-based authentication method. The concept Includes granting logical access based on physical location and proximity. Which of the following Is the BEST solution for the pilot?A . Geofencing B. Self-sovereign identification C. PKl certificates D. SSOView AnswerAnswer: A Explanation:...
Which of the following BEST describes the purpose of this device?
After a WiFi scan of a local office was conducted, an unknown wireless signal was identified Upon investigation, an unknown Raspberry Pi device was found connected to an Ethernet port using a single connection. Which of the following BEST describes the purpose of this device?A . loT sensor B. Evil...
Which of the following techniques will the systems analyst MOST likely implement to address this issue?
A systems analyst determines the source of a high number of connections to a web server that were initiated by ten different IP addresses that belong to a network block in a specific country. Which of the following techniques will the systems analyst MOST likely implement to address this issue?A...
Which of the following connection methods would BEST fulfill this need?
A company would like to set up a secure way to transfer data between users via their mobile phones The company's top pnonty is utilizing technology that requires users to be in as close proximity as possible to each other. Which of the following connection methods would BEST fulfill this...
A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?
A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?A . Containment B. Identification C. Recovery D. PreparationView AnswerAnswer: B Explanation: Vulnerability scanning is a proactive...