Which of the following will the CISO MOST likely recommend to mitigate this risk?
A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operations in the event of a prolonged DDoS attack on its local datacenter that consumes server resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?A . Upgrade the bandwidth...
Which of the following is the BEST solution for the law office?
A law ofce has been leasing dark ber from a local telecommunications company to connect a remote ofce to company headquarters. The telecommunication company has decided to discontinue its dark ber product and is offering an MPLS connection. Which the law office feels is too expensive. Which of the following...
When an initialization vector is added to each encryption cycle, it is using the:
When an initialization vector is added to each encryption cycle, it is using the:A . ECB cipher mode.B . MD5 cipher mode.C . XOR cipher mode.D . CBC cipher mode.View AnswerAnswer: C
Which of the following Is the MOST likely issue, and how can the organization BEST prevent this from happening?
An organization discovers that unauthorized applications have been installed on company-provided mobile phones. The organization issues these devices, but some users have managed to bypass the security controls. Which of the following Is the MOST likely issue, and how can the organization BEST prevent this from happening?A . The mobile...
Which of the following BEST describes the concept of persistence in the context of penetration testing?
Which of the following BEST describes the concept of persistence in the context of penetration testing?A . The capability of maintaining service availability during a sustained DDoS attack providing persistent serviceB . The property of a system used by penetration testers to exploit long-running network connectionsC . The state where...
Which of the following would be the BEST solution for the CIO to implement?
A Chief Information Officer (CIO) is concerned that encryption keys might be exfiltrated by a contractor. The CIO wants to keep control over key visibility and management. Which of the following would be the BEST solution for the CIO to implement?”A . HSMB . CAC . SSHD . SSLView AnswerAnswer:...
Which of the following tools can be used to fulll the requirements that were established by the engineer?
A security engineer needs to obtain a recurring log of changes to system les. The engineer is most concerned with detecting unauthorized changes to system data. Which of the following tools can be used to fulll the requirements that were established by the engineer?A . TPMB . Trusted operating systemC...
Which of the following BEST describes the scanned environment?
Given the following output: Which of the following BEST describes the scanned environment?A . A host was identified as a web server that is hosting multiple domains.B . A host was scanned, and web-based vulnerabilities were found.C . A connection was established to a domain, and several redirect connections were...
Which of the following would limit access to the wireless network to only organization-owned devices in the sales department?
A network administrator needs to restrict the users of the company's WAPs to the sales department. The network administrator changes and hides the SSID and then discovers several employees had connected their personal devices to the wireless network. Which of the following would limit access to the wireless network to...
Which of the following agreement types is a non-contractual agreement between two or more parties and outlines each party’s requirements and responsibilities?
Which of the following agreement types is a non-contractual agreement between two or more parties and outlines each party’s requirements and responsibilities?A . BPAB . SLAC . MOUD . ISAView AnswerAnswer: C