Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)A . Block cipher B. Hashing C. Private key D. Perfect forward secrecy E. Salting F. Symmetric keysView AnswerAnswer: B,C Explanation: Non-repudiation is the ability to ensure that a party cannot deny a previous action...
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host: Based on the IoCS, which of the following was the MOST likely attack used to compromise...
Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk...
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrix B. Risk tolerance C. Risk register D. Risk appetiteView AnswerAnswer: B Explanation: To determine the total risk an organization can...
Which of the following identifies the point in time when an organization will recover data in the event of an outage?
Which of the following identifies the point in time when an organization will recover data in the event of an outage?A . SLA B. RPO C. MTBF D. AROView AnswerAnswer: B Explanation: Recovery Point Objective (RPO) is the maximum duration of time that an organization can tolerate data loss in...
Which of the password attacks is MOST likely happening?
A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?A . Dictionary B. Rainbow table C. Spraying D. Brute-forceView AnswerAnswer: C Explanation: Detailed Explanation:...
Which of the following data sources would be BEST to use to assess the accounts impacted by this attack?
During an investigation, the incident response team discovers that multiple administrator accounts were suspected of being compromised. The host audit logs indicate a repeated brute-force attack on a single administrator account followed by suspicious logins from unfamiliar geographic locations. Which of the following data sources would be BEST to use...
Which of the following cloud service provider types should business engage?
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should business engage?A . A laaS B. PaaS C. XaaS D. SaaSView AnswerAnswer: A Explanation: Infrastructure as a Service...
Which of the following is MOST likely the cause?
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?A . A new firewall rule is needed to access the application. B. The...
Which of the following should the engineer implement?
A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?A . An air gap B. A hot site C. A VUAN D. A screened subnetView AnswerAnswer: D Explanation: A screened subnet...