Which of the following architectural decisions would BEST reduce the likelihood of a successful attack without harming operational capability?

An architect was recently hired by a power utility to increase the security posture of the company’s power generation and distribution sites. Upon review, the architect identifies legacy hardware with highly vulnerable and unsupported software driving critical operations. These systems must exchange data with each other, be highly synchronized, and...

February 3, 2020 No Comments READ MORE +

Which of the following documents would BEST protect the company and ensure timely assistance?

A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated. Which of the following documents would BEST protect the company and...

February 2, 2020 No Comments READ MORE +

Which of the following methods could be used in addition to an integrated development environment to reduce the severity of the issue?

A software development manager is running a project using agile development methods. The company cybersecurity engineer has noticed a high number of vulnerabilities have been making it into production code on the project. Which of the following methods could be used in addition to an integrated development environment to reduce...

February 1, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

February 1, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

February 1, 2020 No Comments READ MORE +

Which of the following would BEST prevent the problem from reoccurring in the future?

A user workstation was infected with a new malware variant as a result of a drive-by download. The security administrator reviews key controls on the infected workstation and discovers the following: Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)A . Install HIPSB...

February 1, 2020 No Comments READ MORE +

Which of the following should the penetration tester conclude about the command output?

A penetration tester is conducting an assessment on Comptia.org and runs the following command from a coffee shop while connected to the public Internet: Which of the following should the penetration tester conclude about the command output?A . The public/private views on the Comptia.org DNS servers are misconfiguredB . Comptia.org...

February 1, 2020 No Comments READ MORE +

Which of the following actions should the SaaS provider perform to minimize legitimate customer impact?

A SaaS-based email service provider often receives reports from legitimate customers that their IP netblocks are on blacklists and they cannot send email. The SaaS has confirmed that affected customers typically have IP addresses within broader network ranges and some abusive customers within the same IP ranges may have performed...

January 31, 2020 No Comments READ MORE +

Which of the following should the consultant recommend be performed to evaluate potential risks?

A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises. Which of the following should the consultant recommend be performed to evaluate potential risks?A ....

January 31, 2020 No Comments READ MORE +

Which of the following technical options would provide the MOST preventive value?

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and...

January 31, 2020 No Comments READ MORE +