Which of the following attacks is the MOST probable cause?

A store receives reports that shoppers’ credit card information is being stolen. Upon further analysis, those same shoppers also withdrew money from an ATM in that store. The attackers are using the targeted shoppers’ credit card information to make online purchases. Which of the following attacks is the MOST probable...

April 27, 2023 No Comments READ MORE +

Which of the following is needed to meet the objective?

A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?A . A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced serversView AnswerAnswer: B Explanation: A Web Application Firewall...

April 27, 2023 No Comments READ MORE +

Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?

Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?A . ISO 27701 B. The Center for Internet Security C. SSAE SOC 2 D. NIST Risk Management...

April 27, 2023 No Comments READ MORE +

Which of the following is the most likely cause of this issue?

A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer files to the NAS, even through the data is still viewable from the user’s PCs....

April 27, 2023 No Comments READ MORE +

Which of the following BEST describes this type of email?

An employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm employee's identity before sending him the prize. Which of the following BEST describes this type of email?A . Spear...

April 27, 2023 No Comments READ MORE +

Which of the following would MOST likely be considered a benefit of this certification?

An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?A . It allows for the sharing of digital forensics data across organizations B. It provides insurance in case of a data breach C. It provides complimentary training and...

April 27, 2023 No Comments READ MORE +

Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?

Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?A . PoC B. Production C. Test D. DevelopmentView AnswerAnswer: A...

April 27, 2023 No Comments READ MORE +

Which of te following will the engineer MOST likely use to achieve this objective?

A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and are unable to support the addition of MFA. Which of te following will the engineer MOST likely use to achieve this...

April 27, 2023 No Comments READ MORE +

Which of the following MOST likely would have prevented the attacker from learning the service account name?

A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation: Which of the following MOST likely would have prevented the attacker from learning the service account name?A . Race condition testing B....

April 27, 2023 No Comments READ MORE +

Which of the following controls would provide the BEST protection against tailgating?

Which of the following controls would provide the BEST protection against tailgating?A . Access control vestibule B. Closed-circuit television C. Proximity card reader D. Faraday cageView AnswerAnswer: A Explanation: Access control vestibules, also known as mantraps or airlocks, are physical security features that require individuals to pass through two or...

April 27, 2023 No Comments READ MORE +