Which of the following controls would be BEST for the analyst to recommend?

A security is assisting the marketing department with ensuring the security of the organization’s social media platforms. The two main concerns are: The Chief marketing officer (CMO) email is being used department wide as the username The password has been shared within the department Which of the following controls would...

March 19, 2024 No Comments READ MORE +

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking. After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to...

March 19, 2024 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization.B . Deploy...

March 19, 2024 No Comments READ MORE +

Which of the following is the BEST solution for this company?

A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company’s website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option. Which...

March 18, 2024 No Comments READ MORE +

Which of the following historian server locations will allow the business to get the required reports in an ОТ and IT environment?

An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports. Which of the following historian server locations will allow the business to get the required reports in an ОТ...

March 18, 2024 No Comments READ MORE +

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?A . Deploy a SOAR tool.B . Modify user password history...

March 18, 2024 No Comments READ MORE +

Which of the following BEST explains why secure LDAP is not working?

A company that uses AD is migrating services from LDAP to secure LDAP. During the pilot phase, services are not connecting properly to secure LDAP. Block is an except of output from the troubleshooting session: Which of the following BEST explains why secure LDAP is not working? (Select TWO.)A ....

March 18, 2024 No Comments READ MORE +

Which of the following would BEST mitigate this vulnerability?

A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests: Which of the following would BEST mitigate this vulnerability?A . CAPTCHAB . Input validationC . Data encodingD . Network intrusion...

March 18, 2024 No Comments READ MORE +

Which of the following would be BEST to use to store customer keys?

A company publishes several APIs for customers and is required to use keys to segregate customer data sets. Which of the following would be BEST to use to store customer keys?A . A trusted platform moduleB . A hardware security moduleC . A localized key storeD . A public key...

March 18, 2024 No Comments READ MORE +

Which of the following actions would BEST address the potential risks by the activity in the logs?

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log. Which of the following actions would BEST address the potential risks by the activity in the logs?A ....

March 18, 2024 No Comments READ MORE +