Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

A startup company is using multiple SaaS and laaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?A . SIEMB . DLPC . CASBD . SWGView AnswerAnswer: C

March 18, 2021 No Comments READ MORE +

Which of the following would BEST prevent this issue in the future?

Users are attempting to access a company's website but are transparently redirected to another website. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the future?A . DNSSECB . HTTPSC . IPSecD . TLS/SSLView AnswerAnswer: A

March 18, 2021 No Comments READ MORE +

Which of the following would be the FIRST step to implement the SSL certificate?

A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST step to implement the SSL certificate?A . Download the web certificate.B . Install the intermediate certificate.C . Generate a CSE . Encrypt the private key.View AnswerAnswer: C

March 18, 2021 No Comments READ MORE +

Which of the following would be the attacker's NEXT action?

An attacker has obtained the user ID and password of a datacenter’s backup operator and has gained access to a production system. Which of the following would be the attacker's NEXT action?A . Perform a passive reconnaissance of the network.B . Initiate a confidential data exfiltration process.C . Look for...

March 17, 2021 No Comments READ MORE +

Which of the following solutions will be used to deploy the IDS?

A company recently experienced data exfiltration via the corporate network. In response to the breach, a security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be implemented without purchasing any additional network hardware. Which of the following solutions will be used to deploy the IDS?A...

March 17, 2021 No Comments READ MORE +

Which of the following BEST describes the type of threat the organization faces?

A company moved into a new building next to a sugar mil. Cracks have been discovered in the walls of the server room, which is located on the same side as the sugar mill loading docks. The cracks are believed to have been caused by heavy trucks. Moisture has begun...

March 17, 2021 No Comments READ MORE +

Which of the following are disadvantages of full backups? (Select THREE)

Which of the following are disadvantages of full backups? (Select THREE)A . They rely on other backups tor recoveryB . They require the most storage.C . They demand the most bandwidth.D . They have the slowest recovery timeE . They are impossible in virtual environmentsF . They require on-site storage.G...

March 17, 2021 No Comments READ MORE +

Which of the following would be the MOST secure option for the administrator to Implement?

A systems administrator wants to secure a backup environment so backups are less prone to ransomware attacks. The administrator would like to have a fully isolated set of backups. Which of the following would be the MOST secure option for the administrator to Implement?A . A DMZB . An air...

March 17, 2021 No Comments READ MORE +

In which of the following risk management strategies would cybersecurity insurance be used?

In which of the following risk management strategies would cybersecurity insurance be used?A . TransferenceB . AvoidanceC . AcceptanceD . MitigationView AnswerAnswer: B

March 17, 2021 No Comments READ MORE +

Which of the following social engineering principles is Joe employing in this scenario?

During a penetration test, Joe, an analyst, contacts the target's service desk Impersonating a user, he attempts to obtain assistance with resetting an email password. Joe claims this needs to be done as soon as possible, as he is the vice president of sales and does not want to contact...

March 17, 2021 No Comments READ MORE +