Which of the following incident response processes is the CISO requesting?

The Chief Information Secunty Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?A . Lessons learned B. Preparation C. Detection D. Containment E. Root cause analysisView AnswerAnswer: A

March 7, 2023 No Comments READ MORE +

Which of the following should be done FIRST?

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done FIRST?A . Configure heat maps. B. Utilize captive portals. C. Conduct...

March 7, 2023 No Comments READ MORE +

Which of the following considerations would BEST support the organization's resiliency?

An organization is planning lo open other data centers to sustain operations in the event of a natural disaster. Which of the following considerations would BEST support the organization's resiliency?A . Geographic dispersal B. Generator power C. Fire suppression D. Facility automationView AnswerAnswer: A

March 7, 2023 No Comments READ MORE +

Digital signatures use asymmetric encryption. This means the message is encrypted with:

Digital signatures use asymmetric encryption. This means the message is encrypted with:A . the sender's private key and decrypted with the sender's public key B. the sender's public key and decrypted with the sender's private key C. the sender’s private key and decrypted with the recipient's public key. D. the...

March 7, 2023 No Comments READ MORE +

Which of the following should the organization consider before implementation?

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).A . The back-end directory source B. The identity federation protocol C. The hashing method D. The encryption...

March 7, 2023 No Comments READ MORE +

Which of the following statements BEST describes zero-day exploits'?

Which of the following statements BEST describes zero-day exploits'?A . When a zero-day exploit is discovered, the system cannot be protected by any means B. Zero-day exploits have their own scoring category in CVSS C. A zero-day exploit is initially undetectable and no patch for it exists D. Discovering zero-day...

March 7, 2023 No Comments READ MORE +

Which of the following 15 the technician's BEST course of action?

A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity modem response team The caller asks the technician to verify the network's internal firewall IP address. Which of the following 15 the technician's BEST course of action?A . Direct the caller...

March 6, 2023 No Comments READ MORE +

Which of the following attacks is being used to compromise the user accounts?

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following • All users share workstations throughout the day • Endpoint protection was disabled on several workstations throughout the network. • Travel times on logins...

March 6, 2023 No Comments READ MORE +

Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?

Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?A . Recovery B. Deterrent C. Corrective D. DetectiveView AnswerAnswer: C Explanation: Corrective controls are implemented after detective controls to rectify the problem and (ideally) prevent it from happening again.

March 6, 2023 No Comments READ MORE +

Which of the following is assured when a user signs an email using a private key?

Which of the following is assured when a user signs an email using a private key?A . Non-repudiation B. Confidentiality C. Availably D. AuthenticationView AnswerAnswer: A Explanation: Non Repudiation is your virtual John Hancock. It's a way of virtually stamping any data or document with "I am who I say...

March 6, 2023 No Comments READ MORE +