Which of the following BEST addresses the problem best address the problem with the least amount of administrative effort?

Over the last 90 days, many storage services has been exposed in the cloud services environments, and the security team does not have the ability to see is creating these instance. Shadow IT is creating data services and instances faster than the small security team can keep up with them....

December 5, 2021 No Comments READ MORE +

Which of the following response actions should the analyst take FIRST?

A security analyst notices a number of SIEM events that show the following activity: Which of the following response actions should the analyst take FIRST?A . Disable powershell.exe on all Microsoft Windows endpoints.B . Restart Microsoft Windows Defender.C . Configure the forward proxy to block 40.90.23.154.D . Disable local administrator...

December 4, 2021 No Comments READ MORE +

Which of the following vulnerabilities does the code snippet resolve?

A developer implement the following code snippet. Which of the following vulnerabilities does the code snippet resolve?A . SQL injectB . Buffer overflowC . Missing session limitD . Information leakageView AnswerAnswer: D

December 4, 2021 No Comments READ MORE +

Which of the follow would MOST likely be used?

The Chief information Officer (CIO) wants to establish a non-banding agreement with a third party that outlines the objectives of the mutual arrangement dealing with data transfers between both organizations before establishing a format partnership . Which of the follow would MOST likely be used?A . MOUB . OLAC ....

December 4, 2021 No Comments READ MORE +

Which of the following describes the administrator’s discovery?

An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access. Which of the following describes the administrator’s discovery?A . A vulnerabilityB . A threatC . A breachD . A riskView AnswerAnswer:...

December 3, 2021 No Comments READ MORE +

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking. After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to...

December 3, 2021 No Comments READ MORE +

Which of the following solutions should the security architect recommend?

A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy. Which of the...

December 3, 2021 No Comments READ MORE +

Which of the following should be modified to prevent the issue from reoccurring?

A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services. Which of the following should be modified to prevent the issue from reoccurring?A . Recovery point objectiveB . Recovery time objectiveC...

December 2, 2021 No Comments READ MORE +

Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?

A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location. Which of the following technologies can the developer enable...

December 2, 2021 No Comments READ MORE +

Which of the following processes can be used to identify potential prevention recommendations?

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . DetectionB . RemediationC . PreparationD . RecoveryView AnswerAnswer: A

December 2, 2021 No Comments READ MORE +