Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?

Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?A . CVSS B. SIEM C. SOAR D. CVEView AnswerAnswer: A Explanation: CVSS is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). CVSS metrics generate a score from 0 to 10...

March 19, 2023 No Comments READ MORE +

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?

Which of the following documents provides expectations at a technical level for quality, availability, and responsibilities?A . EOL B. SLA C. MOU D. EOSLView AnswerAnswer: B

March 19, 2023 No Comments READ MORE +

Which of the following attacks has taken place?

A security analyst is investigating some users who are being redirected to a fake website that resembles www.comptia.org. The following output was found on the naming server of the organization: Which of the following attacks has taken place?A . Domain reputation B. Domain hijacking C. Disassociation D. DNS poisoningView AnswerAnswer:...

March 19, 2023 No Comments READ MORE +

Which of the following should the company do to help accomplish this goal?

A company is implementing a DLP solution on the file server. The file server has Pll. financial information, and health information stored on it Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the...

March 18, 2023 No Comments READ MORE +

Which biometric error would allow an unauthorized user to access a system?

Which biometric error would allow an unauthorized user to access a system?A . False acceptance B. False entrance C. False rejection D. False denialView AnswerAnswer: C

March 18, 2023 No Comments READ MORE +

Which of the following concepts does this message describe?

A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?A...

March 18, 2023 No Comments READ MORE +

Which of the following is the BEST solution to reduce the risk of data loss?

A large bank with two geographically dispersed data centers is concerned about major power disruptions at both locations Every day each location expenences very brief outages that last for a few seconds However during the summer a high risk of intentional brownouts that last up to an hour exists particularly...

March 18, 2023 No Comments READ MORE +

Which of the following terms describes a broad range of information that is sensitive to a specific organization?

Which of the following terms describes a broad range of information that is sensitive to a specific organization?A . Public B. Top secret C. Proprietary D. Open-sourceView AnswerAnswer: C

March 18, 2023 No Comments READ MORE +

Which of the following cloud models is being used?

A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?A . Public B. Community C. Hybrid D. PrivateView AnswerAnswer: C...

March 17, 2023 No Comments READ MORE +

Which of the following is the policy MOST likely protecting against?

The Chief Compliance Officer from a bank has approved a background check policy for all new hires. Which of the following is the policy MOST likely protecting against?A . Preventing any current employees' siblings from working at the bank to prevent nepotism B. Hiring an employee who has been convicted...

March 17, 2023 No Comments READ MORE +