Which of the following would MOST likely meet the organizations requirement?
An organization wants to participate in threat intelligence information sharing with peer groups. Which of the following would MOST likely meet the organizations requirement?A . Perform OSINT investigations B. Subscribe to threat intelligence feeds C. Submit RFCs D. Implement a TAXII serverView AnswerAnswer: B
Which of the following solutions would BEST meet the needs of the company?
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of...
Which of the following BEST descnbes this technique?
A customer service representative reported an unusual text message that was sent to the help desk. The message contained an unrecognized invoice number with a large balance due and a link to click for more details. Which of the following BEST descnbes this technique?A . Vishing B. Whaling C. Phishing...
Which of the following attack vectors was exploited to install the hardware?
After returning from a conference, a user's laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard . Which of the following attack vectors was exploited to install...
Which of the following BEST explains this reasoning?
During a trial, a judge determined evidence gathered from a hard drive was not admissible. Which of the following BEST explains this reasoning?A . The forensic investigator forgot to run a checksum on the disk image after creation B. The chain of custody form did not note time zone offsets...
Which of the following attacks has taken place?
A security analyst is investigating some users who are being redirected to a fake website that resembles www.comptia.org. The following output was found on the naming server of the organization: Which of the following attacks has taken place?A . Domain reputation B. Domain hijacking C. Disassociation D. DNS poisoningView AnswerAnswer:...
Which of the following can be used to optimize the incident response time?
After multiple on premises security solutions were migrated to the cloud, the incident response time increased. The analyst are spending a long time to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?A ....
Which of the following describes this attack?
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the...
Which of the following tools will the security analyst MOST likely use to accomplish this task?
A security analyst wants to fingerpnnt a web server. Which of the following tools will the security analyst MOST likely use to accomplish this task?A . nmap -p1-65S35 192.168.0.10 B. dig 192.168.0.10 C. cur1 --htad http://192.168.0.10 D. ping 192.168.0.10View AnswerAnswer: C Explanation: HTTP/1.1 301 Moved Permanently Server: cloudflare Date: Thu,...
Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?A . Acceptance B. Transference C. Avoidance D. MitigationView AnswerAnswer: A