Which of the following solutions will require the LEAST management and support from the company?
A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company has 100 databases that are on premises. Which of the following solutions will require the LEAST management and support from the company?A . SaaS B. IaaS C. PaaS D. SDNView AnswerAnswer: A...
As part of a security compliance assessment, an auditor performs automated vulnerability scans. In addition, which of the following should the auditor do to complete the assessment?
As part of a security compliance assessment, an auditor performs automated vulnerability scans. In addition, which of the following should the auditor do to complete the assessment?A . User behavior analysis B. Packet captures C. Configuration reviews D. Log analysisView AnswerAnswer: D Explanation: A vulnerability scanner is essentially doing that....
Which of the following attacks explains what occurred?
Data exftitration analysis indicates that an attacker managed to download system configuration notes from a web server. The web-server logs have been deleted, but analysts have determined that the system configuration notes were stored in the database administrator's folder on the web server. Which of the following attacks explains what...
Which of the following would BEST provide detective and corrective controls for thermal regulation?
Which of the following would BEST provide detective and corrective controls for thermal regulation?A . A smoke detector B. A fire alarm C. An HVAC system D. A fire suppression system E. GuardsView AnswerAnswer: C Explanation: What are the functions of an HVAC system? An HVAC system is designed to...
Which of the following attacks has taken place?
A security analyst is investigating some users who are being redirected to a fake website that resembles www.comptia.org. The following output was found on the naming server of the organization: Which of the following attacks has taken place?A . Domain reputation B. Domain hijacking C. Disassociation D. DNS poisoningView AnswerAnswer:...
Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configuring network devices?
After a recent security breach, a security analyst reports that several administrative usernames and passwords are being sent via cleartext across the network to access network devices over port 23. Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and...
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?A . Intellectual property theft B. Elevated privileges C. Unknown backdoor D. Quality assuranceView AnswerAnswer: C
Which of the following can be written to document this agreement?
Two organizations plan to collaborate on the evaluation of new SIEM solutions for their respective companies. A combined effort from both organizations' SOC teams would speed up the effort. Which of the following can be written to document this agreement?A . MOU B. ISA C. SLA D. NDAView AnswerAnswer: A...
Which of the following describes the continuous delivery software development methodology?
Which of the following describes the continuous delivery software development methodology?A . Waterfall B. Spiral C. V-shaped D. AgileView AnswerAnswer: D
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?
Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?A . Transit gateway B. Cloud hot site C. Edge computing D. DNS sinkholeView AnswerAnswer: A