Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C

May 28, 2022 No Comments READ MORE +

Which of the following would BEST help the team ensure the application is ready to be released to production?

The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?A . Limit the...

May 28, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

May 28, 2022 No Comments READ MORE +

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B

May 28, 2022 No Comments READ MORE +

Based on the analyst’s findings, which of the following attacks is being executed?

A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: To better understand what is going on, the analyst runs a command and receives the following output:...

May 28, 2022 No Comments READ MORE +

Which of the following RAID levels should the administrator select?

A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?A . 0B . 1C . 5D . 6View AnswerAnswer: B

May 28, 2022 No Comments READ MORE +

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C

May 28, 2022 No Comments READ MORE +

Which of the following would be BEST to mitigate CEO’s concern?

The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from...

May 28, 2022 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

May 27, 2022 No Comments READ MORE +

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?A ....

May 27, 2022 No Comments READ MORE +