Which of the following describes how the CSO managed the risk?
The Chief Security Officer (CSO) for an online retailer received a report from a penetration test that was performed against the company's servers. After reviewing the report, the CSO decided not to implement the recommended changes due to cost; instead, the CSO increased insurance coverage for data breaches. Which of...
Which of the following is the MOST likely cause of the failure?
A security engineer deploys a certificate from a commercial CA to the RADIUS server for use with the EAP-TLS wireless network. Authentication is failing, so the engineer examines the certificate's properties: Which of the following is the MOST likely cause of the failure?A . The certificate is missing the proper...
Which of the following is the main difference between symmetric end asymmetric cryptographic algorithms?
Which of the following is the main difference between symmetric end asymmetric cryptographic algorithms?A . The use of PKI in symmetric algorithmsB . HSM-based key generationC . Only one Key used in symmetric algorithmsD . Random vs pseudo-random key generationView AnswerAnswer: C
Which of the following is the MOST time-efficient method to achieve this goal?
A company's IT staff is given the task of securely disposing of 100 server HDDs. The security team informs the IT staff that the data must not be accessible by a third party after disposal. Which of the following is the MOST time-efficient method to achieve this goal?A . Use...
Which of the following would BEST protect the company from data exfiltration via removable media?
A company has drafted an Insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...
Which of the following should the technician implement to BEST reduce the risk of this happening in the future?
A company uses WPA2-PSK. and it appears there are multiple unauthorized devices connected to the wireless network A technician suspects this is because the wireless password has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the...
Which of the Mowing Is the NEXT step in the incident response process?
A company recently experienced a security breach. The security start determined that the intrusion was due to an out-of-date proprietary software program running on a noncompliant server. The server was imaged and copied onto a hardened VM. with the previous connections re-established. Which of the Mowing Is the NEXT step...
Which of the following commands should the penetration tester use to verify if this vulnerability exists?
A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)A . tcpdumpB . ncC . nmapD . nslookupE . tailF . tracertView...
Which of the following are MOST to appear m the impact section of the report?
After discovering a buffer overflow vulnerability an application the security analyst needs to report it to the development team leader. Which of the following are MOST to appear m the impact section of the report? (Select TWO).A . An attacker can obtain privileged data handled by the applicationB . An...
Which of the following is the MOST likely cause and next step?
An application developer is working on a new calendar and scheduling application. The developer wants to test new functionality that is time/date dependent and set the local system time to one year in the future. The application also has a feature that uses SHA-256 hashing and AES encryption for data...