Which of the following should the engineer employ to meet these requirements?
A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....
Which of the following targeted the organization?
An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled. Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D Explanation: https://www.imperva.com/learn/application-security/apt-advanced-persistent-threat/ https://csrc.nist.gov/glossary/term/advanced_persistent_threat
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?A . FootprintingB . White-box testingC . A drone/UAVD . PivotingView AnswerAnswer: A
Which of the following social-engineering techniques was used in this case?
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?A . SPIMB . VishingC . Spear phishingD . SmishingView AnswerAnswer: D
Which of the following would MOST likely have prevented this breach?
A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD . BiometricsView...
Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A Explanation: https://nmap.org/book/man-version-detection.html NMAP scans running services and can tell you what services...
Which of the following would be the BEST way to achieve this objective?
A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?A . OAuthB . SSOC . SAMLD . PAPView AnswerAnswer: C
Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....
Which of the following implementations would be BEST to prevent the issue from reoccurring?
A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent the issue from reoccurring?A . CASBB . SWGC...
Which of the following would BEST meet this need?
A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D Explanation: The Common Vulnerability Scoring System (CVSS) is a...