Which of the following actions should the SaaS provider perform to minimize legitimate customer impact?

A SaaS-based email service provider often receives reports from legitimate customers that their IP netblocks are on blacklists and they cannot send email. The SaaS has confirmed that affected customers typically have IP addresses within broader network ranges and some abusive customers within the same IP ranges may have performed...

September 13, 2021 No Comments READ MORE +

Which of the following should the security administrator implement?

A security administrator wants to allow external organizations to cryptographically validate the company’s domain name in email messages sent by employees . Which of the following should the security administrator implement?A . SPFB . S/MIMEC . TLSD . DKIMView AnswerAnswer: D

September 13, 2021 No Comments READ MORE +

Which of the following is the MOST likely reason for the team lead’s position?

A newly hired security analyst has joined an established SOC team. Not long after going through corporate orientation, a new attack method on web-based applications was publicly revealed. The security analyst immediately brings this new information to the team lead, but the team lead is not concerned about it. Which...

September 12, 2021 No Comments READ MORE +

Which of the following data types a MOST likely at risk of exposure based on this new threat?

A pharmacy gives its clients online access to their records and the ability to review bills and make payments. A new SSL vulnerability on a special platform was discovered, allowing an attacker to capture the data between the end user and the web server providing these services. After invest the...

September 12, 2021 No Comments READ MORE +

Which of the following BEST explains why secure LDAP is not working?

A company that uses AD is migrating services from LDAP to secure LDAP. During the pilot phase, services are not connecting properly to secure LDAP. Block is an except of output from the troubleshooting session: Which of the following BEST explains why secure LDAP is not working? (Select TWO.)A ....

September 12, 2021 No Comments READ MORE +

Which of the following in the MOST likely explanation for why the organization network was compromised?

A system administrator recently conducted a vulnerability scan of the internet. Subsequently, the organization was successfully attacked by an adversary . Which of the following in the MOST likely explanation for why the organization network was compromised?A . There was a false positive since the network was fully patched.B ....

September 11, 2021 No Comments READ MORE +

Which of the following system would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect ... secrecy?

Which of the following system would be at the GREATEST risk of compromise if found to have an open vulnerability associated with perfect ... secrecy?A . EndpointsB . VPN concentratorsC . Virtual hostsD . SIEME . Layer 2 switchesView AnswerAnswer: B

September 11, 2021 No Comments READ MORE +

Which of the following will the analyst most likely use NEXT?

A security analyst is comparing two virtual servers that were bum from the same image and patched at the same regular intervals Server A is used to host a public-facing website, and Server B runs accounting software inside the firewalled accounting network. The analyst runs the same command and obtains...

September 11, 2021 No Comments READ MORE +

Which of the following BEST meets this objective?

The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors . Which of the following BEST meets this objective?A . Identify a third-party source for IDS rules and change the configuration on the applicable IDSs...

September 11, 2021 No Comments READ MORE +

Which of the following would BEST address the CIO’s concerns?

The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaS applications. The applications are configured to use passwords, and two-factor authentication is not provided natively . Which of the following would BEST address the CIO’s concerns?A . Procure a password manager for the employees...

September 10, 2021 No Comments READ MORE +