Which Of the following should the company implement?
A company was recently infected by malware. During the root cause analysis. the company determined that several users were installing their own applications. TO prevent further compromises, the company has decided it will only allow authorized applications to run on its systems. Which Of the following should the company implement?A...
Which of the following protocols is a low power, low data rate that allows for the creation of PAN networks?
Which of the following protocols is a low power, low data rate that allows for the creation of PAN networks?A . Zigbee B. CAN C. DNP3 D. ModbusView AnswerAnswer: A Explanation: Reference: https://urgentcomm.com/2007/11/01/connecting-on-a-personal-level/
Which of the following should the engineer report as the ARO for successful breaches?
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times. Which of the following should the engineer report as the ARO for successful breaches?A . 0.5 B. 8 C. 50 D. 36,500View...
Which of the following should the security team recommend FIRST?
A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown...
Which of the following actions would BEST resolve the issue?
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization. B. Deploy...
Which of the following steps would be best to perform FIRST?
A host on a company’s network has been infected by a worm that appears to be spreading via SMB. A security analyst has been tasked with containing the incident while also maintaining evidence for a subsequent investigation and malware analysis. Which of the following steps would be best to perform...
Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?
A security engineer is reviewing a record of events after a recent data breach incident that Involved the following: • A hacker conducted reconnaissance and developed a footprint of the company s Internet-facing web application assets. • A vulnerability in a third-party horary was exploited by the hacker, resulting in...
Which of the following technologies would mitigate the manipulation of memory segments?
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation: graphic.linux_randomization.prg Which of the following technologies would mitigate the manipulation of memory segments?A . NX bit B. ASLR C. DEP D. HSMView AnswerAnswer: B Explanation: https://eklitzke.org/memory-protection-and-aslr
Which of the following security configurations is MOST likely the cause of the error?
A user experiences an HTTPS connection error when trying to access an Internet banking website from a corporate laptop. The user then opens a browser on a mobile phone and is able to access the same Internet banking website without issue. Which of the following security configurations is MOST likely...
Which of the following would provide the BEST boot loader protection?
A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots. Which of the following would provide the BEST boot loader protection?A ....