Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers . Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A...

April 19, 2022 No Comments READ MORE +

Which of the following should the administrator use when configuring the VPN?

A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions. Which of the following should the administrator use when configuring the VPN?A . AHB . EDRC . ESPD . DNSSECView AnswerAnswer:...

April 19, 2022 No Comments READ MORE +

From which of the following did the alert MOST likely originate?

A security analyst has received an alert about being sent via email. The analyst’s Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care. From which of the following did the alert MOST likely originate?A . S/MIMEB . DLPC . IMAPD . HIDSView...

April 19, 2022 No Comments READ MORE +

Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft . Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

April 19, 2022 No Comments READ MORE +

Which of the following should the administrator use?

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk . Which of the following should the administrator use?A . ddB . chmodC . dnsenumD . loggerView AnswerAnswer: A

April 19, 2022 No Comments READ MORE +

Which of the following solutions would BEST support the policy?

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices . Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A

April 18, 2022 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

April 18, 2022 No Comments READ MORE +

Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?

A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment . Which of the following would be MOST effective...

April 18, 2022 No Comments READ MORE +

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B

April 18, 2022 No Comments READ MORE +

Which of the following would mitigate the damage done by this type of data exfiltration in the future?

A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text . Which of the following would mitigate the damage done by this type of data exfiltration in the future?A . Create DLP controls that...

April 18, 2022 1 Comment READ MORE +