Which of the following risk management strategies has the organization employed?

Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...

June 3, 2018 No Comments READ MORE +

A security administrator must configure the database server shown below the comply with the four requirements listed. Drag and drop the appropriate ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all

DRAG DROP A security administrator must configure the database server shown below the comply with the four requirements listed. Drag and drop the appropriate ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all. View AnswerAnswer:

May 28, 2018 No Comments READ MORE +

Which of the following is required in this scenario?

A company has entered into a business agreement with a business partner for managed human resources services. The Chief Information Security Officer (CISO) has been asked to provide documentation that is required to set up a business-to-business VPN between the two organizations. Which of the following is required in this...

May 22, 2018 No Comments READ MORE +

Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website?

Given the following output from a local PC: Which of the following ACLs on a stateful host-based firewall would allow the PC to serve an intranet website?A . Allow 172.30.0.28:80 -> ANYB . Allow 172.30.0.28:80 -> 172.30.0.0/16C . Allow 172.30.0.28:80 -> 172.30.0.28:443D . Allow 172.30.0.28:80 -> 172.30.0.28:53View AnswerAnswer: B

May 17, 2018 No Comments READ MORE +

Which of the following approaches is described?

To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO...

May 9, 2018 No Comments READ MORE +

Which of the following should the penetration tester conclude about the command output?

A penetration tester is conducting an assessment on Comptia.org and runs the following command from a coffee shop while connected to the public Internet: Which of the following should the penetration tester conclude about the command output?A . The public/private views on the Comptia.org DNS servers are misconfiguredB . Comptia.org...

May 8, 2018 No Comments READ MORE +

Which of the following did the analyst use to determine the location of the malicious payload?

A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet: ^32^[34fda19(fd^43gfd/home/user/lib/module.so.343jk^rfw(342fds43g Which of the following did the analyst use to determine the location of the malicious payload?A . Code deduplicatorsB . Binary reverse-engineeringC . Fuzz...

May 2, 2018 No Comments READ MORE +

The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend as the NEXT step?

The data will be hosted and managed outside of the company’s geographical location The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project’s security consultant recommend...

May 1, 2018 No Comments READ MORE +

Using the above information, on which VLANs should multicast be enabled?

A hospital uses a legacy electronic medical record system that requires multicast for traffic between the application servers and databases on virtual hosts that support segments of the application. Following a switch upgrade, the electronic medical record is unavailable despite physical connectivity between the hypervisor and the storage being in...

April 24, 2018 No Comments READ MORE +

Which of the following tools BEST supports the use of these definitions?

A security controls assessor intends to perform a holistic configuration compliance test of networked assets. The assessor has been handed a package of definitions provided in XML format, and many of the files have two common tags within them: “<object object_ref=… />” and “<state state_ref=… />”. Which of the following...

April 20, 2018 No Comments READ MORE +