Which of the following concepts does this message describe?
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?A...
Which of the following should the systems engineer consider?
An organization is building backup server rooms in geographically diverse locations The Chief Information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?A . Purchasing...
Which of the following would BEST meet the requirements?
A security analyst is designing the appropnate controls to limit unauthorized access to a physical site. The analyst has a directive to utilize the lowest possible budget. Which of the following would BEST meet the requirements?A . Preventive controls B. Compensating controls C. Deterrent controls D. Detective controlsView AnswerAnswer: C...
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?A . CVSS B. SIEM C. SOAR D. CVEView AnswerAnswer: A Explanation: CVSS is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). CVSS metrics generate a score from 0 to 10...
Which of the following technologies meets the requirement?
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?A . SSO B. IDS C. MFA D. TPMView AnswerAnswer: C
Which of the following does this process BEST protect?
A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?A . Data in transit B. Data in processing C. Data at rest D. Data tokenizationView AnswerAnswer: C Explanation: Data at rest: Data at rest...
Which of the following tools will the other team member MOST likely use to open this file?
A security analyst generated a file named host1.pcap and shared it with a team member who is going to use it for further incident analysis. Which of the following tools will the other team member MOST likely use to open this file?A . Autopsy B. Memdump C. FTK imager D....
A social media company based in North Amenca is looking to expand into new global markets and needs to maintain compliance with international standards.
A social media company based in North Amenca is looking to expand into new global markets and needs to maintain compliance with international standards. With which of the following is the company's data protection officer MOST likely concerned''A . NIST Framework B. ISO 27001 C. GDPR D. PCI-DSSView AnswerAnswer: B
Which of the following are required to BEST meet these objectives?
A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows: • Critical fileshares will remain accessible during and after a natural disaster • Frve percent of hard disks can fail at any given time without impacting the data. • Systems...
Which of the following would BEST allow a security analyst to have this ability?
A security analyst needs to be able to search and correlate logs from multiple sources in a single tool. Which of the following would BEST allow a security analyst to have this ability?A . SOAR B. SIEM C. Log collectors D. Network-attached storageView AnswerAnswer: B Explanation: SIEM event correlation is...