Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code . Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD...

April 26, 2022 3 Comments READ MORE +

Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?

Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?A . Red teamB . While teamC . Blue teamD . Purple teamView AnswerAnswer: A Explanation: Red team―performs the offensive role to try to infiltrate the target.

April 25, 2022 No Comments READ MORE +

Which of the following should the company implement to BEST prevent this from occurring?

A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute...

April 25, 2022 No Comments READ MORE +

Which of the following intelligence sources should to security analyst review?

A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute . Which of the following intelligence sources should to security analyst review?A . Vulnerability feedsB . Trusted automated exchange of indicator informationC . Structured threat information expressionD . Industry information-sharing...

April 25, 2022 No Comments READ MORE +

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B Explanation: https://ktechproducts.com/Data-mask#:~:text=Data%20Masking%20is%20a%20method%20of%20creating%20a,partial%2 0data%20based%20on%20the%20user%E2%80%99s%20security%20permissions. The main reason for applying masking to a...

April 25, 2022 No Comments READ MORE +

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?A . MOUB . MTTRC . SLAD . NDAView AnswerAnswer: C Explanation: Service level agreement (SLA). An SLA is an agreement between a company...

April 25, 2022 No Comments READ MORE +

Which of the following social-engineering techniques is the attacker using?

The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards . Which of the following...

April 25, 2022 No Comments READ MORE +

Which of the following is MOST likely occurring?

While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on...

April 25, 2022 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly . Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer:...

April 25, 2022 No Comments READ MORE +

Which of the following would be MOST suitable for training the developers'?

A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers . Which of the following would be MOST suitable for training the developers'?A . A capture-the-flag competitionB . A phishing simulationC ....

April 24, 2022 2 Comments READ MORE +