Which of the following will the company MOST likely reference for guidance during this change?
Due to unexpected circumstances, an IT company must vacate its main office, forcing all operations to alternate, off-site locations. Which of the following will the company MOST likely reference for guidance during this change?A . The business continuity plan B. The retention policy C. The disaster recovery plan D. The...
Which of the following is the BEST security solution to reduce this risk?
The Chief Information Security Officer directed a nsk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?A . CASB B. VPN concentrator C. MFA D. VPC...
For this reason which of the following features should the security team prioritize FIRST?
An amusement park is implementing a btomelnc system that validates customers' fingerpnnts to ensure they are not sharing tickets. The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?A . Low FAR...
Which of the following control types has the organization implemented?
An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?A . Steganography B. Homomotphic encryption C. Cipher surte D. BlockchainView AnswerAnswer: A Explanation: Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order...
Which of the following methods will the analyst MOST likely use?
A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?A . Look for tampenng on the evidence collection bag B. Encrypt the collected data using asymmetric encryption C. Ensure proper procedures for...
Which of the following describes this attack?
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the...
Which of the following attacks has MOST likely occurred?
Security analysts are conducting an investigation of an attack that occurred inside the organization’s network. An attacker was able to connect network traffic between workstation throughout the network. The analysts review the following logs: The layer 2 address table has hundred of entries similar to the ones above. Which of...
Which of the following is MOST likely the result of the security analyst's review?
Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a Security analyst for further review. The security analyst reviews the following metrics: Which of the following is MOST likely the result of the security analyst's review?A . The ISP is dropping outbound...
Which of the following firewall policies would be MOST secure for a web server?
After a recent security incident, a security analyst discovered that unnecessary ports were open on a firewall policy for a web server. Which of the following firewall policies would be MOST secure for a web server? A) B) C) D) A . Option A B. Option B C. Option C...