Which biometric error would allow an unauthorized user to access a system?

Which biometric error would allow an unauthorized user to access a system?A . False acceptance B. False entrance C. False rejection D. False denialView AnswerAnswer: C

January 30, 2023 No Comments READ MORE +

Which of the following should be implemented to BEST address the CSO's concerns?

A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls. Which of the following...

January 30, 2023 No Comments READ MORE +

Which of the following is the MOST likely attack conducted on the environment?

A junior security analyst iss conducting an analysis after passwords were changed on multiple accounts without users' interaction. The SIEM have multiple login entries with the following text: Which of the following is the MOST likely attack conducted on the environment?A . Malicious script B. Privilege escalation C. Doman hijacking...

January 30, 2023 No Comments READ MORE +

Which of the following would detect intrusions at the perimeter of an airport?

Which of the following would detect intrusions at the perimeter of an airport?A . Signage B. Fencing C. Motion sensors D. Lighting E. BollardsView AnswerAnswer: C

January 30, 2023 No Comments READ MORE +

Which of the following is the BEST remediation strategy?

A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers. Which of the following is the BEST remediation strategy?A . Update the base container image and redeploy the environment B. Include the containers in the regular patching schedule for servers C. Patch...

January 30, 2023 No Comments READ MORE +

Which of the following is the MOST effective control against zero-day vulnerabilities?

Which of the following is the MOST effective control against zero-day vulnerabilities?A . Network segmentation B. Patch management C. Intrusion prevention system D. Multiple vulnerability scannersView AnswerAnswer: A

January 30, 2023 No Comments READ MORE +

Which of the following attacks took place?

An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?A . On-path attack B....

January 30, 2023 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

January 30, 2023 No Comments READ MORE +

Which of the following security controls can be implemented?

A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing Employees who travel need their accounts protected without the nsk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following...

January 30, 2023 No Comments READ MORE +

Which of the following will the blue team do after detecting an loC?

An organization has hired a ted team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an loC?A . Reimage the impacted workstations B. Activate runbooks for incident response C. Conduct forensics on the compromised system D. Conduct passive reconnaissance to...

January 30, 2023 No Comments READ MORE +