In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

April 21, 2022 No Comments READ MORE +

Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports . Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based...

April 21, 2022 No Comments READ MORE +

Which of the following access control schemes would be BEST for the company to implement?

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels . Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D

April 21, 2022 No Comments READ MORE +

Which of the following account policies would BEST prevent this type of attack?

A workwide manufacturing company has been experiencing email account compromised. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil . Which of the following account policies would BEST prevent this type of attack?A...

April 21, 2022 2 Comments READ MORE +

Which of the following steps should also be taken to harden the smart switch?

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The...

April 21, 2022 No Comments READ MORE +

Which of the following types of attacks does this MOST likely represent?

A security analyst is reviewing the following attack log output: Which of the following types of attacks does this MOST likely represent?A . Rainbow tableB . Brute-forceC . Password-sprayingD . DictionaryView AnswerAnswer: C Explanation: Password spraying is a type of brute-force attack in which a malicious actor uses a single...

April 20, 2022 No Comments READ MORE +

Which of the following should the CISO read and understand before writing the policies?

A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing . Which of the following should the CISO read and understand before writing the policies?A . PCI DSSB . GDPRC . NISTD . ISO 31000View AnswerAnswer: B Explanation: GDPR...

April 20, 2022 No Comments READ MORE +

Which of the following recommendations would BEST address the CSO’s concern?

A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment . Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed...

April 20, 2022 No Comments READ MORE +

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?A . Least privilegeB . Awareness trainingC . Separation of dutiesD . Mandatory vacationView AnswerAnswer: C Explanation: Separation of duties - is a means of establishing checks and balances...

April 20, 2022 No Comments READ MORE +

Which of the following should the engineer employ to meet these requirements?

A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet...

April 19, 2022 No Comments READ MORE +