Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used. Which of the following would BEST secure the routes while allowing the network to function in the event of a...

March 25, 2024 No Comments READ MORE +

Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?

A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users...

March 25, 2024 No Comments READ MORE +

Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements. Which of the following would...

March 25, 2024 No Comments READ MORE +

Which of the following does the business’s IT manager need to consider?

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business’s IT manager need to consider?A . The availability of personal dataB . The right to personal data erasureC . The company’s annual...

March 25, 2024 No Comments READ MORE +

Based on the output above, from which of the following process IDs can the analyst begin an investigation?

A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive. Based on the output above, from which of the following...

March 25, 2024 No Comments READ MORE +

Which of the following describes the administrator’s discovery?

An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access. Which of the following describes the administrator’s discovery?A . A vulnerabilityB . A threatC . A breachD . A riskView AnswerAnswer:...

March 25, 2024 No Comments READ MORE +

Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?

During a system penetration test, a security engineer successfully gained access to a shell on a Linux host as a standard user and wants to elevate the privilege levels. Which of the following is a valid Linux post-exploitation method to use to accomplish this goal?A . Spawn a shell using...

March 24, 2024 No Comments READ MORE +

Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information. Which of the following provides the BEST guidance for protecting such information while it is at...

March 24, 2024 No Comments READ MORE +

Which of the following solutions should the security team implement to mitigate the risk of data loss?

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following: Unstructured data being exfiltrated after an employee leaves the...

March 24, 2024 No Comments READ MORE +

Which of the following actions will enable the data feeds needed to detect these types of attacks on development environments?

A home automation company just purchased and installed tools for its SOC to enable incident identification and response on software the company develops. The company would like to prioritize defenses against the following attack scenarios: Unauthorized insertions into application development environments Authorized insiders making unauthorized changes to environment configurations Which...

March 24, 2024 No Comments READ MORE +