Which of the following describes how the CSO managed the risk?

The Chief Security Officer (CSO) for an online retailer received a report from a penetration test that was performed against the company's servers. After reviewing the report, the CSO decided not to implement the recommended changes due to cost; instead, the CSO increased insurance coverage for data breaches. Which of...

March 12, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the failure?

A security engineer deploys a certificate from a commercial CA to the RADIUS server for use with the EAP-TLS wireless network. Authentication is failing, so the engineer examines the certificate's properties: Which of the following is the MOST likely cause of the failure?A . The certificate is missing the proper...

March 12, 2021 No Comments READ MORE +

Which of the following is the main difference between symmetric end asymmetric cryptographic algorithms?

Which of the following is the main difference between symmetric end asymmetric cryptographic algorithms?A . The use of PKI in symmetric algorithmsB . HSM-based key generationC . Only one Key used in symmetric algorithmsD . Random vs pseudo-random key generationView AnswerAnswer: C

March 12, 2021 No Comments READ MORE +

Which of the following is the MOST time-efficient method to achieve this goal?

A company's IT staff is given the task of securely disposing of 100 server HDDs. The security team informs the IT staff that the data must not be accessible by a third party after disposal. Which of the following is the MOST time-efficient method to achieve this goal?A . Use...

March 11, 2021 No Comments READ MORE +

Which of the following would BEST protect the company from data exfiltration via removable media?

A company has drafted an Insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...

March 11, 2021 No Comments READ MORE +

Which of the following should the technician implement to BEST reduce the risk of this happening in the future?

A company uses WPA2-PSK. and it appears there are multiple unauthorized devices connected to the wireless network A technician suspects this is because the wireless password has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the...

March 11, 2021 No Comments READ MORE +

Which of the Mowing Is the NEXT step in the incident response process?

A company recently experienced a security breach. The security start determined that the intrusion was due to an out-of-date proprietary software program running on a non­compliant server. The server was imaged and copied onto a hardened VM. with the previous connections re-established. Which of the Mowing Is the NEXT step...

March 11, 2021 No Comments READ MORE +

Which of the following commands should the penetration tester use to verify if this vulnerability exists?

A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)A . tcpdumpB . ncC . nmapD . nslookupE . tailF . tracertView...

March 11, 2021 No Comments READ MORE +

Which of the following are MOST to appear m the impact section of the report?

After discovering a buffer overflow vulnerability an application the security analyst needs to report it to the development team leader. Which of the following are MOST to appear m the impact section of the report? (Select TWO).A . An attacker can obtain privileged data handled by the applicationB . An...

March 11, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause and next step?

An application developer is working on a new calendar and scheduling application. The developer wants to test new functionality that is time/date dependent and set the local system time to one year in the future. The application also has a feature that uses SHA-256 hashing and AES encryption for data...

March 11, 2021 No Comments READ MORE +