Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation
HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...
Which of the following is a benefit of including a risk management framework into an organization's security approach?
Which of the following is a benefit of including a risk management framework into an organization's security approach?A . It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner B. It identifies specific vendor products that have been tested and...
Preconfigure the client for an incoming guest.
Preconfigure the client for an incoming guest. The guest AD credentials are: User: guest01 Password: guestpass View AnswerAnswer: Use the same settings as describe in below images. Graphical user interface, application Description automatically generated Graphical user interface, text, application Description automatically generated
Which of the following BEST describes this technique?
A customer service representative reported an unusual text message that was sent to the help desk. The message contained an unrecognized invoice number with a large balance due and a link to click for more details. Which of the following BEST describes this technique?A . Vishing B. Whaling C. Phishing...
Which of the following options BEST fulfils the architect’s requirements?
DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfils the architect’s requirements?A . An orchestration solution that can adjust scalability of...
In which of the following environments should the patch be deployed LAST?
An organization has developed an application that needs a patch to fix a critical vulnerability. In which of the following environments should the patch be deployed LAST?A . Test B. Staging C. Development D. ProductionView AnswerAnswer: A
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?A . Common Weakness Enumeration B. OSINT C. Dark web D. Vulnerability databasesView AnswerAnswer: C
Which of the following issues is MOST likely occurring?
A systems administrator reports degraded performance on a virtual server. The administrator increases the virtual memory allocation which improves conditions, but performance degrades again after a few days. The administrator runs an anarysis tool and sees the following output: The administrator terminates the timeAttend.exe observes system performance over the next...
Which of the following would BEST provide detective and corrective controls for thermal regulation?
Which of the following would BEST provide detective and corrective controls for thermal regulation?A . A smoke detector B. A fire alarm C. An HVAC system D. A fire suppression system E. GuardsView AnswerAnswer: C Explanation: What are the functions of an HVAC system? An HVAC system is designed to...
Which of the following statements BEST describes zero-day exploits'?
Which of the following statements BEST describes zero-day exploits'?A . When a zero-day exploit is discovered, the system cannot be protected by any means B. Zero-day exploits have their own scoring category in CVSS C. A zero-day exploit is initially undetectable and no patch for it exists D. Discovering zero-day...