Which of the following attacks took place?
An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?A . On-path attack B....
Which of the following is a known security nsk associated with data archives that contain financial information?
Which of the following is a known security nsk associated with data archives that contain financial information?A . Data can become a liability if archived longer than required by regulatory guidance B. Data must be archived off-site to avoid breaches and meet business requirements C. Companies are prohibited from providing...
Which of the following actions would be BEST to prevent reinfection from the initial infection vector?
An organization has activated an incident response plan due to a malware outbreak on its network The organization has brought in a forensics team that has identified an internet-facing Windows server as the likely point of initial compromise The malware family that was detected is known to be distributed by...
Which of the following does this process BEST protect?
A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?A . Data in transit B. Data in processing C. Data at rest D. Data tokenizationView AnswerAnswer: C Explanation: Data at rest: Data at rest...
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?A . Shut down the VDI and copy off the event logs. B. Take a memory snapshot of the running system. C. Use NetFlow to identify command-and-control IPs. D. Run a full on-demand...
Which of the following should the systems engineer consider?
An organization is building backup server rooms in geographically diverse locations The Chief Information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?A . Purchasing...
Which of the following is the BEST way for the company to mitigate this attack?
A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?A . Create a honeynet to trap attackers who access the VPN with credentials...
Which of the following would BEST describe the estimated number of devices to be replaced next year?
An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...
Which of the following BEST meets these requirements?
A security analyst has been asked by the Chief Information Security Officer to • develop a secure method of providing centralized management of infrastructure • reduce the need to constantly replace aging end user machines • provide a consistent user desktop expenence Which of the following BEST meets these requirements?A...
Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?
A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement. Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?A . Autopsy B. Cuckoo C....