Which of the following types of attacks has occurred?

After a phishing scam fora user's credentials, the red team was able to craft payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session Which of the following types of attacks has occurred?A . Privilege escalation B. Session replay C....

May 6, 2023 No Comments READ MORE +

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?A . Production B. Test C. Staging D. DevelopmentView AnswerAnswer: D Explanation: The environment that utilizes dummy data and is most...

May 6, 2023 No Comments READ MORE +

Which of the following would BEST meet these requirements?

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...

May 6, 2023 No Comments READ MORE +

Which of the following constraints BEST describes the reason the findings cannot be remediated?

A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business. Which of the following constraints BEST describes the reason the findings cannot be remediated?A . inability to authenticate B. Implied...

May 6, 2023 No Comments READ MORE +

Which of the following types of malware is MOST likely infecting the hosts?

A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?A . A RAT B. Ransomware...

May 6, 2023 No Comments READ MORE +

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?A . Hashing B. DNS sinkhole C. TLS inspection D. Data maskingView AnswerAnswer: C Explanation: an IDS (Intrusion Detection System) and a WAF (Web Application Firewall) are both used to monitor...

May 6, 2023 No Comments READ MORE +

Which of the following BEST describes the team that acts as a referee during a penetration-testing exercise?

Which of the following BEST describes the team that acts as a referee during a penetration-testing exercise?A . White team B. Purple team C. Green team D. Blue team E. Red teamView AnswerAnswer: A Explanation: During a penetration testing exercise, the white team is responsible for acting as a referee...

May 6, 2023 No Comments READ MORE +

Which of the following network appliances can achieve this goal?

An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?A . HSM B. CASB C. TPM D. DLPView AnswerAnswer: A Explanation: Hardware Security Module (HSM) is a network appliance designed to securely store cryptographic keys and perform cryptographic operations....

May 5, 2023 No Comments READ MORE +

Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?

Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?A . The key length of the encryption algorithm B. The encryption algorithm's longevity C. A method of introducing entropy into key calculations D. The...

May 5, 2023 No Comments READ MORE +

Which of the following statements BEST explains the issue?

A security engineer is reviewing the logs from a SAML application that is configured to use MFA, during this review the engineer notices a high volume of successful logins that did not require MFA from users who were traveling internationally. The application, which can be accessed without a VPB, has...

May 5, 2023 No Comments READ MORE +