Which of the following attacks has taken place?

A security analyst is investigating some users who are being redirected to a fake website that resembles www.comptia.org. The following output was found on the naming server of the organization: Which of the following attacks has taken place?A . Domain reputation B. Domain hijacking C. Disassociation D. DNS poisoningView AnswerAnswer:...

March 16, 2023 No Comments READ MORE +

Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?

A company wants to improve end users experiences when they tog in to a trusted partner website The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to...

March 16, 2023 No Comments READ MORE +

During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings.

During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings. Which of the following should be the client's NEXT step to mitigate the issue''A...

March 15, 2023 No Comments READ MORE +

Which of the following is the MOST likely attack conducted on the environment?

A junior security analyst iss conducting an analysis after passwords were changed on multiple accounts without users' interaction. The SIEM have multiple login entries with the following text: Which of the following is the MOST likely attack conducted on the environment?A . Malicious script B. Privilege escalation C. Doman hijacking...

March 15, 2023 No Comments READ MORE +

Which of the following cloud deployment strategies would BEST meet this need?

Several universities are participating m a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would BEST meet this need?A . Community B. Private C. Public D. HybridView AnswerAnswer: A Explanation: Community cloud storage is a variation of the private cloud...

March 15, 2023 No Comments READ MORE +

An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?

An organization has developed an application that needs a patch to fix a critical vulnerability In which of the following environments should the patch be deployed LAST?A . Test B. Staging C. Development D. ProductionView AnswerAnswer: A

March 15, 2023 No Comments READ MORE +

Which of the following technologies meets the requirement?

A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?A . SSO B. IDS C. MFA D. TPMView AnswerAnswer: C

March 15, 2023 No Comments READ MORE +

Which of the following is the BEST certificate for these requirements?

A tax organization is working on a solution to validate the online submission of documents. The solution should be earned on a portable USB device that should be inserted on any computer that is transmitting a transaction securely. Which of the following is the BEST certificate for these requirements?A ....

March 15, 2023 No Comments READ MORE +

Which of the following actions would be recommended to improve an incident response process?

Which of the following actions would be recommended to improve an incident response process?A . Train the team to identify the difference between events and incidents B. Modify access so the IT team has full access to the compromised assets C. Contact the authorities if a cybercrime is suspected D....

March 14, 2023 No Comments READ MORE +

Which of the following is the BEST solution to adopt?

Business partners are working on a Security mechanism lo validate transactions securely. The requirement is for one company to be responsible for deploying a trusted solution that will register and issue artifacts used to sign encrypt, and decrypt transaction files. Which of the following is the BEST solution to adopt?A...

March 14, 2023 No Comments READ MORE +