Which of the following issues is MOST likely occurring?

A systems administrator reports degraded performance on a virtual server. The administrator increases the virtual memory allocation which improves conditions, but performance degrades again after a few days. The administrator runs an anarysis tool and sees the following output: The administrator terminates the timeAttend.exe observes system performance over the next...

January 27, 2023 No Comments READ MORE +

fingerpnnts to ensure they are not sharing tickets The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?

An amusement park is implementing a btomelnc system that validates customers' fingerpnnts to ensure they are not sharing tickets The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?A . Low FAR...

January 27, 2023 No Comments READ MORE +

Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?

Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?A . Intellectual property theft B. Elevated privileges C. Unknown backdoor D. Quality assuranceView AnswerAnswer: C

January 26, 2023 No Comments READ MORE +

Which of the following attacks has MOST likely occurred?

Security analysts are conducting an investigation of an attack that occurred inside the organization’s network. An attacker was able to connect network traffic between workstation throughout the network. The analysts review the following logs: The layer 2 address table has hundred of entries similar to the ones above. Which of...

January 26, 2023 No Comments READ MORE +

Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?

Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?A . Check to see if the third party has resources to create dedicated development and staging environments. B. Verify the number of companies that downloaded the third-party code and the...

January 26, 2023 No Comments READ MORE +

Which of the following should the organization consider before implementation?

An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).A . The back-end directory source B. The identity federation protocol C. The hashing method D. The encryption...

January 26, 2023 No Comments READ MORE +

Which of the following statements BEST describes zero-day exploits'?

Which of the following statements BEST describes zero-day exploits'?A . When a zero-day exploit is discovered, the system cannot be protected by any means B. Zero-day exploits have their own scoring category in CVSS C. A zero-day exploit is initially undetectable and no patch for it exists D. Discovering zero-day...

January 26, 2023 No Comments READ MORE +

Which of the following is the BEST certificate for these requirements?

A tax organization is working on a solution to validate the online submission of documents The solution should be earned on a portable USB device that should be inserted on any computer that is transmitting a transaction securely. Which of the following is the BEST certificate for these requirements?A ....

January 26, 2023 No Comments READ MORE +

Which of the following firewall policies would be MOST secure for a web server?

After a recent security incident, a security analyst discovered that unnecessary ports were open on a firewall policy for a web server. Which of the following firewall policies would be MOST secure for a web server? A) B) C) D) A . Option A B. Option B C. Option C...

January 25, 2023 No Comments READ MORE +

Which biometric error would allow an unauthorized user to access a system?

Which biometric error would allow an unauthorized user to access a system?A . False acceptance B. False entrance C. False rejection D. False denialView AnswerAnswer: C

January 25, 2023 No Comments READ MORE +