Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).A . Mantraps B. Security guards C. Video surveillance D. Fences E. Bollards F. AntivirusView AnswerAnswer: A,B Explanation: A - a mantrap can trap those personnal with bad intension(preventive), and kind...
Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?
A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the...
Which of the following is the administrator MOST likely trying to do?
When planning to build a virtual environment, an administrator need to achieve the following, • Establish polices in Limit who can create new VMs • Allocate resources according to actual utilization‘ • Require justication for requests outside of the standard requirements. • Create standardized categories based on size and resource...
Which of the following attacks was used?
An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?A . Cryptomalware B. Hash substitution C....
Which of the following incident response steps occurs before containment?
Which of the following incident response steps occurs before containment?A . Eradication B. Recovery C. Lessons learned D. IdentificationView AnswerAnswer: D Explanation: Identification is the first step in the incident response process, which involves recognizing that an incident has occurred. Containment is the second step, followed by eradication, recovery, and...
Which of the following BEST describes the attack the company is experiencing?
A security analyst has received several reports of an issue on an internal web application. Users state they are having to provide their credentials twice to log in. The analyst checks with the application team and notes this is not an expected behavior. After looking at several logs, the analyst...
Which of the following connection methods would BEST fulfill this need?
A company would like to set up a secure way to transfer data between users via their mobile phones. The company's top pnonty is utilizing technology that requires users to be in as close proximity as possible to each other. Which of the following connection methods would BEST fulfill this...
Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?
A security analyst needs an overview of vulnerabilities for a host on the network. Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?A . Non-credentialed B. Web application C. Privileged D. InternalView AnswerAnswer: C Explanation: Privileged scanning,...
Which of the following is a cryptographic concept that operates on a fixed length of bits?
Which of the following is a cryptographic concept that operates on a fixed length of bits?A . Block cipher B. Hashing C. Key stretching D. SaltingView AnswerAnswer: A Explanation: Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that...
To which of the following groups should the analyst report this real-world event?
The SIEM at an organization has detected suspicious traffic coming a workstation in its internal network. An analyst in the SOC the workstation and discovers malware that is associated with a botnet is installed on the device A review of the logs on the workstation reveals that the privileges of...