Which of the following protocols would BEST meet this objec1ive?
As part of a corporate merger. two companies are combining resources. As a result, they must transfer files through the internet in a secure manner. Which of the following protocols would BEST meet this objec1ive? (Select TWO)A . LDAPSB . SFTP‘C . HTTPSD . DNSSECE . SRTPView AnswerAnswer: B,C
Which of the following controls does a mantrap BEST represent?
Which of the following controls does a mantrap BEST represent?A . DeterrentB . DetectiveC . PhysicalD . CorrectiveView AnswerAnswer: C
Which of the following types of malware is MOST likely installed on the compromised host?
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?A . KeyloggerB . SpywareC . TrojanD . BackdoorE . RootkitView AnswerAnswer: C
Which of the following access control methods should managers use to assign after-hours access to the employees?
Several systems and network administrators are determining how to manage access to a facility and enable managers to allow after-hours access. Which of the following access control methods should managers use to assign after-hours access to the employees?A . Rule-based access controlB . Discretionary access controlC . Mandatory access controlD...
Which of the following types of vulnerability scans should be conducted?
A security administrator wants to determine if a company's web servers have the latest operating system and application patches installed. Which of the following types of vulnerability scans should be conducted?A . Non-credentialedB . PassiveC . PortD . CredentialedE . Red teamF . ActiveView AnswerAnswer: D
Which of the following should the security consultant configure in the MDM policies for the tablets?
A coffee company which operates a chain of stores across a large geographical area is deploying tablets to use as point-of-sale devices. A security consultant has been given the following requirements: - The cashiers must be able to log in to the devices quickly. - The devices must be compliant...
Which of the following will the company MOST likely review to trace this transaction?
After a ransomware attack. a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?A . The public ledgerB . The NetFlow dataC . A checksumD . The event logView AnswerAnswer: D
Which of the following protocols should the company use?
A network administrator is configuring a honeypot in a company's DMZ To provide a method for hackers to access the system easily, the company needs to configure a plaintext authentication method that will send only the username and password to a service in the honeypot. Which of the following protocols...
Poor inventory control practices can lead to undetected and potentially catastrophic system exploitation due to:
Poor inventory control practices can lead to undetected and potentially catastrophic system exploitation due to:A . diversion of capital funds to cover leased equipment costs.B . license exhaustion as a result of protecting more devices.C . control gaps resulting from unmanaged hosts.D . missing SIEM threat feed updates.View AnswerAnswer: C
Which of the following actions should the network team take to prevent this type of breach from reoccurring?
A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert prompting a network engineer to log in to the switch to diagnose the issue When the engineer logged in. the red team was able to...