Which of the technologies is used to actively monitor for specific file types being transmitted on the network?

Which of the technologies is used to actively monitor for specific file types being transmitted on the network?A . File integrity monitoring B. Honeynets C. Tcpreplay D. Data loss preventionView AnswerAnswer: D Explanation: Data loss prevention (DLP) is a technology used to actively monitor for specific file types being transmitted...

May 5, 2023 No Comments READ MORE +

Which of the following is the BEST method?

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?A . Disable Telnet and force SSH. B. Establish a continuous ping. C. Utilize an agentless monitor D. Enable SNMPv3 With passwords.View AnswerAnswer: C Explanation: An agentless monitor is...

May 5, 2023 No Comments READ MORE +

Which of the following should the CISO choose?

The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device...

May 5, 2023 No Comments READ MORE +

Which of the following would be BEST suited for this task?

A security administrator wants to implement a program that tests a user's ability to recognize attacks over the organization's email system. Which of the following would be BEST suited for this task?A . Social media analysis B. Annual information security training C. Gamification D. Phishing campaignView AnswerAnswer: D Explanation: A...

May 5, 2023 No Comments READ MORE +

Which of the following choices BEST meets the requirements?

The Chief information Security Officer has directed the security and networking team to retire the use of shared passwords on routers and switches. Which of the following choices BEST meets the requirements?A . SAML B. TACACS+ C. Password vaults D. OAuthView AnswerAnswer: B Explanation: TACACS+ is a protocol used for...

May 5, 2023 No Comments READ MORE +

Which of the following BEST explains a risk of this practice?

A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?A . Default system configuration B. Unsecure protocols C. Lack of vendor support D. Weak encryptionView AnswerAnswer: C Explanation: Using legacy software to support a critical...

May 5, 2023 No Comments READ MORE +

Which of the following should the administrator consider?

A security administrator is working on a solution to protect passwords stored in a database against rainbow table attacks. Which of the following should the administrator consider?A . Hashing B. Salting C. Lightweight cryptography D. SteganographyView AnswerAnswer: B Explanation: Salting is a technique that adds random data to a password...

May 4, 2023 No Comments READ MORE +

Which of the following can be implemented to prevent these issues from reoccuring?

An employee's company account was used in a data breach Interviews with the employee revealed: • The employee was able to avoid changing passwords by using a previous password again. • The account was accessed from a hostile, foreign nation, but the employee has never traveled to any other countries....

May 4, 2023 No Comments READ MORE +

Which of the following types of attacks does this scenario describe?

A bad actor tries to persuade someone to provide financial information over the phone in order to gain access to funds. Which of the following types of attacks does this scenario describe?A . Vishing B. Phishing C. Spear phishing D. WhalingView AnswerAnswer: A Explanation: Vishing is a social engineering attack...

May 4, 2023 No Comments READ MORE +

Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?

The technology department at a large global company is expanding its Wi-Fi network infrastructure at the headquarters building. Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?A . Authentication protocol B. Encryption type C. WAP placement D. VPN configurationView AnswerAnswer: C Explanation: WAP...

May 4, 2023 No Comments READ MORE +