Which of the following firewall ACLs will accomplish this goal?
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?A . Access list outbound permit 0.0.0.0 0 0.0.0.0/0 port 53 Access...
Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?
Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?A . Provisioning resourcesB . Disabling accessC . Reviewing change approvalsD . Escalating permission requestsView AnswerAnswer: B Explanation: Disabling access is an automation use case that...
Which of the following would be the best way to block unknown programs from executing?
Which of the following would be the best way to block unknown programs from executing?A . Access control listB . Application allow list.C . Host-based firewallD . DLP solutionView AnswerAnswer: B Explanation: An application allow list is a security technique that specifies which applications are permitted to run on a...
Which of the following techniques is the attacker using?
An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?A . SmishingB . DisinformationC . ImpersonatingD . WhalingView AnswerAnswer: D Explanation: Whaling is a type of phishing attack that targets high-profile individuals,...
Which of the following analysis elements did the company most likely use in making this decision?
A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?A . IMTTRB . RTOC . AROD . MTBFView AnswerAnswer: C Explanation: ARO (Annualized Rate...
Which of the following best describes this step?
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?A . Capacity planningB . RedundancyC . Geographic dispersionD . Tablet exerciseView AnswerAnswer: A...
Which of the following should the systems administrator use?
A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems...
Which of the following should be done next?
A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?A . Conduct an audit.B . Initiate a penetration test.C . Rescan the network.D . Submit a report.View AnswerAnswer: C Explanation: After completing...
Which of the following should the organization deploy to best protect against similar attacks in the future?
An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?A . NGFWB . WAFC . TLSD . SD-WANView AnswerAnswer: B Explanation: A buffer overflow is a type of software vulnerability...
Which of the following should a database administrator use to access the database servers?
A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?A . Jump serverB . RADIUSC . HSMD . Load balancerView AnswerAnswer: A Explanation: A jump server is a...