Which of the following processes will the security analyst Identify as the MOST likely indicator of system compromise given the processes running in Task Manager?

A company employee downloads an application from the internet. After the installation, the employee begins experiencing noticeable performance issues, and files are appearing on the desktop. Which of the following processes will the security analyst Identify as the MOST likely indicator of system compromise given the processes running in Task...

May 16, 2023 No Comments READ MORE +

Which of the following is the best solution to improve the equipment's security posture?

Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the best solution to improve the equipment's security posture?A . Move the legacy systems behind a WAR B. Implement an air gap for the legacy systems. C. Place the legacy systems in the perimeter network....

May 16, 2023 No Comments READ MORE +

Which of the following techniques were used in this scenario?

Joe, a penetration tester, used a professional directory to identify a network administrator and ID administrator for a client’s company. Joe then emailed the network administrator, identifying himself as the ID administrator, and asked for a current password as part of a security exercise. Which of the following techniques were...

December 15, 2022 No Comments READ MORE +

Which of the following IP addresses does the analyst need to investigate further?

After a breach involving the exfiltration of a large amount of sensitive data a security analyst is reviewing the following firewall logs to determine how the breach occurred: Which of the following IP addresses does the analyst need to investigate further?A . 192.168.1.1 B. 192.168.1.10 C. 192.168.1.12 D. 192.168.1.193View AnswerAnswer:...

December 15, 2022 No Comments READ MORE +

As part of a merger with another organization, a Chief Information Security Officer (CISO) is working with an assessor to perform a risk assessment focused on data privacy compliance. The CISO is primarily concerned with the potential legal liability and fines associated with data privacy.

As part of a merger with another organization, a Chief Information Security Officer (CISO) is working with an assessor to perform a risk assessment focused on data privacy compliance. The CISO is primarily concerned with the potential legal liability and fines associated with data privacy. Based on the CISO's concerns,...

December 15, 2022 No Comments READ MORE +

Which of the following would provide the BEST results?

A security analyst wants to identify which vulnerabilities a potential attacker might initially exploit if the network is compromised. Which of the following would provide the BEST results?A . Baseline configuration assessment B. Uncredentialed scan C. Network ping sweep D. External penetration testView AnswerAnswer: D

December 15, 2022 No Comments READ MORE +

Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?

Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?A . Self-encrypting drive B. Bus encryption C. TPM D. HSMView AnswerAnswer: A

December 14, 2022 No Comments READ MORE +

Which of the following should be done to prevent this issue from reoccurring?

A storage area network (SAN) was inadvertently powered off while power maintenance was being performed in a datacenter. None of the systems should have lost all power during the maintenance. Upon review, it is discovered that a SAN administrator moved a power plug when testing the SAN's fault notification features....

December 14, 2022 No Comments READ MORE +

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?A . Reverse engineering B. Fuzzing C. Penetration testing D. Network mappingView AnswerAnswer: C

December 14, 2022 No Comments READ MORE +

Which of the following types of policies is used to regulate data storage on the network?

Which of the following types of policies is used to regulate data storage on the network?A . Password B. Acceptable use C. Account management D. RetentionView AnswerAnswer: D Explanation: Reference: http://www.css.edu/administration/information-technologies/computing-policies/computer-and- network-policies.html

December 14, 2022 No Comments READ MORE +