Which of the following tools should be implemented to detect similar attacks?

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....

January 25, 2020 No Comments READ MORE +

For which of the following reasons is the engineer concerned?

A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons...

January 25, 2020 No Comments READ MORE +

Which of the following capabilities must be included for the OS to take advantage of this critical hardware-based countermeasure?

A company is developing requirements for a customized OS build that will be used in an embedded environment. The company procured hardware that is capable of reducing the likelihood of successful buffer overruns while executables are processing. Which of the following capabilities must be included for the OS to take...

January 25, 2020 No Comments READ MORE +

Which of the following is the engineer implementing?

A server (10.0.0.2) on the corporate network is experiencing a DoS from a number of marketing desktops that have been compromised and are connected to a separate network segment. The security engineer implements the following configuration on the management router: Which of the following is the engineer implementing?A . Remotely...

January 25, 2020 No Comments READ MORE +

Which of the following methods should the company use to gauge its social media threat level without targeting individual employees?

A company’s Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees’ social media accounts. Which of the following methods should the company use to gauge its social media threat level without targeting individual employees?A . Utilize insider threat consultants to provide...

January 24, 2020 No Comments READ MORE +

Which of the following need specific attention to meet the requirements listed above?

A security engineer has implemented an internal user access review tool so service teams can baseline user accounts and group memberships. The tool is functional and popular among its initial set of onboarded teams. However, the tool has not been built to cater to a broader set of internal teams...

January 23, 2020 No Comments READ MORE +

Which of the following is required in this scenario?

A company has entered into a business agreement with a business partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations. Which of the following is required in this...

January 23, 2020 No Comments READ MORE +

Which of the following is the MOST likely type of activity occurring?

A security analyst sees some suspicious entries in a log file from a web server website, which has a form that allows customers to leave feedback on the company’s products. The analyst believes a malicious actor is scanning the web form. To know which security controls to put in place,...

January 23, 2020 No Comments READ MORE +

Which of the following should the analyst use to remediate the vulnerabilities?

A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources. Which of the following should the analyst use to remediate the vulnerabilities?A . Protocol analyzerB ....

January 23, 2020 No Comments READ MORE +