Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?A . Preparation phaseB . Containment phaseC . Identification phaseD . Recovery phaseView AnswerAnswer: A

March 25, 2021No CommentsREAD MORE +

What should Bob recommend to deal with such a threat?

Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning. What should Bob recommend to deal with such a threat?A . The use of...

March 24, 2021No CommentsREAD MORE +

What hacking attack is challenge/response authentication used to prevent?

What hacking attack is challenge/response authentication used to prevent?A . Replay attacksB . Scanning attacksC . Session hijacking attacksD . Password cracking attacksView AnswerAnswer: A

March 24, 2021No CommentsREAD MORE +

Which regulation defines security and privacy controls for Federal information systems and organizations?

Which regulation defines security and privacy controls for Federal information systems and organizations?A . HIPAAB . EU Safe HarborC . PCI-DSSD . NIST-800-53View AnswerAnswer: D

March 24, 2021No CommentsREAD MORE +

What is the short-range wireless communication technology George employed in the above scenario?

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a...

March 24, 2021No CommentsREAD MORE +

Which technique is discussed here?

To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list Is divided by assigning half of the list to the newly compromised machines....

March 24, 2021No CommentsREAD MORE +

Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a target website. www.movlescope.com. During this process, he encountered an IDS that detects SQL Injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as ‘'or '1'='1" In any bask injection statement such as "or 1=1." Identify the evasion technique used by Daniel in the above scenario.

Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a target website. www.movlescope.com. During this process, he encountered an IDS that detects SQL Injection attempts based on predefined signatures. To evade any comparison statement, he attempted placing characters such as ‘'or '1'='1" In any...

March 24, 2021No CommentsREAD MORE +

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?A . network SnifferB . Vulnerability ScannerC . Intrusion prevention ServerD . Security incident and event MonitoringView AnswerAnswer: D

March 24, 2021No CommentsREAD MORE +

What is the type of web-service API mentioned in the above scenario?

Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and...

March 24, 20211 CommentREAD MORE +

What is this type of DNS configuration commonly called?

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network. What is this type of DNS configuration commonly called?A . DynDNSB . DNS SchemeC . DNSSECD . Split DNSView AnswerAnswer: D

March 24, 2021No CommentsREAD MORE +