What is the recommended method for collecting security logs from multiple endpoints?

What is the recommended method for collecting security logs from multiple endpoints?A . Leverage an EDR solution to request the logs from endpoints. B. Connect to the endpoints remotely and download the logs. C. Configure endpoints to forward logs to a SIEM. D. Build a script that pulls down the...

April 13, 2023 No Comments READ MORE +

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?A . exploitation B. actions on the objective C. command and control D. installationView AnswerAnswer: C Explanation: Command and Control: Attackers establish...

April 13, 2023 No Comments READ MORE +

Which IoT connectivity technology is provided by satellites?

Which IoT connectivity technology is provided by satellites?A . 4G/LTE B. VLF C. L-band D. 2G/2.5GView AnswerAnswer: C Explanation: 2G/2.5G: 2G connectivity remains a prevalent and viable IoT connectivity option due to the low cost of 2G modules, relatively long battery life, and large installed base of 2G sensors and...

April 13, 2023 No Comments READ MORE +

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:

April 12, 2023 No Comments READ MORE +

Which network firewall primarily filters traffic based on source and destination IP address?

Which network firewall primarily filters traffic based on source and destination IP address?A . Proxy B. Stateful C. Stateless D. ApplicationView AnswerAnswer: B

April 12, 2023 No Comments READ MORE +

Which type of malware takes advantage of a vulnerability on an endpoint or server?

Which type of malware takes advantage of a vulnerability on an endpoint or server?A . technique B. patch C. vulnerability D. exploitView AnswerAnswer: A

April 12, 2023 No Comments READ MORE +

What does SIEM stand for?

What does SIEM stand for?A . Security Infosec and Event Management B. Security Information and Event Management C. Standard Installation and Event Media D. Secure Infrastructure and Event MonitoringView AnswerAnswer: B Explanation: Originally designed as a tool to assist organizations with compliance and industry-specific regulations, security information and event management...

April 12, 2023 No Comments READ MORE +

What are three benefits of SD-WAN infrastructure? (Choose three.)

What are three benefits of SD-WAN infrastructure? (Choose three.)A . Improving performance of SaaS applications by requiring all traffic to be back-hauled through the corporate headquarters network B. Promoting simplicity through the utilization of a centralized management structure C. Utilizing zero-touch provisioning for automated deployments D. Leveraging remote site routing...

April 12, 2023 No Comments READ MORE +

Which network analysis tool can be used to record packet captures?

Which network analysis tool can be used to record packet captures?A . Smart IP Scanner B. Wireshark C. Angry IP Scanner D. NetmanView AnswerAnswer: B

April 11, 2023 No Comments READ MORE +

What is used to orchestrate, coordinate, and control clusters of containers?

What is used to orchestrate, coordinate, and control clusters of containers?A . Kubernetes B. Prisma Saas C. Docker D. CN-SeriesView AnswerAnswer: A Explanation: As containers grew in popularity and used diversified orchestrators such as Kubernetes (and its derivatives, such as OpenShift), Mesos, and Docker Swarm, it became increasingly important to...

April 11, 2023 No Comments READ MORE +