Which of the following control types has the organization implemented?
An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?A . Compensating B. Corrective C. Preventive D. DetectiveView AnswerAnswer: C Explanation: the control acts to eliminate or...
Which of the following is MOST likely the result of the security analyst's review?
Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a secunty analyst for further review. The security analyst reviews the following metrics: Which of the following is MOST likely the result of the security analyst's review?A . The ISP is dropping outbound...
Which of the following would BEST describe the estimated number of devices to be replaced next year?
An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...
Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?
Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?A . Standard naming conventions B. Domain services C. Baseline configurations D. DiagramsView AnswerAnswer: C
Which of the following 15 the technician's BEST course of action?
A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity modem response team The caller asks the technician to verify the network's internal firewall IP address. Which of the following 15 the technician's BEST course of action?A . Direct the caller...
Which of the following can be used to safely assess the file?
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether odified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?A . Check the hash of the installation...
Which of the following account types Is MOST appropriate for this purpose?
A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types Is MOST appropriate for this purpose?A . Service B. Shared C....
Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?
During a recent incident an external attacker was able to exploit an SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?A . Check for any recent SMB CVEs B. Install AV on the affected server C....
Which of the following describes the continuous delivery software development methodology?
Which of the following describes the continuous delivery software development methodology?A . Waterfall B. Spiral C. V-shaped D. AgileView AnswerAnswer: D
Which of the following BEST describes what the administrator is being advised to do?
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?A . Perform a mathematical operation on the passwords that will convert them into umgue stnngs B. Add extra data to the...