Which of the following are common VoIP-associated vulnerabilities? (Select TWO).

Which of the following are common VoIP-associated vulnerabilities? (Select TWO).A . SPIM B. vishing C. Hopping D. Phishing E. Credential harvesting F. TailgatingView AnswerAnswer: A,B

January 30, 2023 No Comments READ MORE +

Which of the following solutions would BEST meet the needs of the company?

A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of...

January 30, 2023 No Comments READ MORE +

Which of the following attack vectors was exploited to install the hardware?

After returning from a conference, a user's laptop has been operating slower than normal and overheating, and the fans have been running constantly. During the diagnosis process, an unknown piece of hardware is found connected to the laptop's motherboard . Which of the following attack vectors was exploited to install...

January 30, 2023 No Comments READ MORE +

Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?

Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?A . Transit gateway B. Cloud hot site C. Edge computing D. DNS sinkholeView AnswerAnswer: A

January 30, 2023 No Comments READ MORE +

Which of the following BEST describes the importance of the final phase of the incident response plan?

A security incident has been resolved. Which of the following BEST describes the importance of the final phase of the incident response plan?A . It examines and documents how well the team responded discovers what caused the incident, and determines how the incident can be avoided in the future B....

January 30, 2023 No Comments READ MORE +

Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?

A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement. Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?A . Autopsy B. Cuckoo C....

January 29, 2023 No Comments READ MORE +

Which of the following should the company do to help accomplish this goal?

A company is implementing a DLP solution on the file server. The file server has Pll. financial information, and health information stored on it Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the...

January 29, 2023 No Comments READ MORE +

Which of the following should the company do FIRST?

An application developer accidentally uploaded a company's code-signing certificate private key to a public web server. The company is concerned about malicious use of its certificate. Which of the following should the company do FIRST?A . Delete the private key from the repository. B. Verify the public key is not...

January 29, 2023 No Comments READ MORE +

Which of the following does this action describe?

A routine audit of medical billing claims revealed that several claims were submitted without the subscriber's knowledge. A review of the audit logs for the medical billing company's system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account. Which of the...

January 29, 2023 No Comments READ MORE +

Which of the following mobile solutions would accomplish these goals?

An organization would like to give remote workers the ability to use applications hosted inside the corporate network Users will be allowed to use their personal computers or they will be provided organization assets Either way no data or applications will be installed locally on any user systems. Which of...

January 29, 2023 No Comments READ MORE +