Which of the following protocols would BEST meet this objec1ive?

As part of a corporate merger. two companies are combining resources. As a result, they must transfer files through the internet in a secure manner. Which of the following protocols would BEST meet this objec1ive? (Select TWO)A . LDAPSB . SFTP‘C . HTTPSD . DNSSECE . SRTPView AnswerAnswer: B,C

March 14, 2021 No Comments READ MORE +

Which of the following controls does a mantrap BEST represent?

Which of the following controls does a mantrap BEST represent?A . DeterrentB . DetectiveC . PhysicalD . CorrectiveView AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

Which of the following types of malware is MOST likely installed on the compromised host?

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?A . KeyloggerB . SpywareC . TrojanD . BackdoorE . RootkitView AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

Which of the following access control methods should managers use to assign after-hours access to the employees?

Several systems and network administrators are determining how to manage access to a facility and enable managers to allow after-hours access. Which of the following access control methods should managers use to assign after-hours access to the employees?A . Rule-based access controlB . Discretionary access controlC . Mandatory access controlD...

March 14, 2021 No Comments READ MORE +

Which of the following types of vulnerability scans should be conducted?

A security administrator wants to determine if a company's web servers have the latest operating system and application patches installed. Which of the following types of vulnerability scans should be conducted?A . Non-credentialedB . PassiveC . PortD . CredentialedE . Red teamF . ActiveView AnswerAnswer: D

March 14, 2021 No Comments READ MORE +

Which of the following should the security consultant configure in the MDM policies for the tablets?

A coffee company which operates a chain of stores across a large geographical area is deploying tablets to use as point-of-sale devices. A security consultant has been given the following requirements: - The cashiers must be able to log in to the devices quickly. - The devices must be compliant...

March 14, 2021 No Comments READ MORE +

Which of the following will the company MOST likely review to trace this transaction?

After a ransomware attack. a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?A . The public ledgerB . The NetFlow dataC . A checksumD . The event logView AnswerAnswer: D

March 14, 2021 No Comments READ MORE +

Which of the following protocols should the company use?

A network administrator is configuring a honeypot in a company's DMZ To provide a method for hackers to access the system easily, the company needs to configure a plaintext authentication method that will send only the username and password to a service in the honeypot. Which of the following protocols...

March 14, 2021 No Comments READ MORE +

Poor inventory control practices can lead to undetected and potentially catastrophic system exploitation due to:

Poor inventory control practices can lead to undetected and potentially catastrophic system exploitation due to:A . diversion of capital funds to cover leased equipment costs.B . license exhaustion as a result of protecting more devices.C . control gaps resulting from unmanaged hosts.D . missing SIEM threat feed updates.View AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

Which of the following actions should the network team take to prevent this type of breach from reoccurring?

A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert prompting a network engineer to log in to the switch to diagnose the issue When the engineer logged in. the red team was able to...

March 14, 2021 No Comments READ MORE +