Which of the following protocols must be supported by both the RADIUS server and the WAPs?
A systems engineer is setting up a RADIUS server to support a wireless network that uses certificate authentication. Which of the following protocols must be supported by both the RADIUS server and the WAPs?A . CCMPB . TKIPC . WPSD . EAPView AnswerAnswer: D
Which of the following would allow the team to determine the scope of future incidents?
A coding error has been discovered on a customer-facing website. The error causes each request to return confidential PHI data for the incorrect organization. The IT department is unable to identify the specific customers who are affected. As a result, all customers must be notified of the potential breach. Which...
Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Select TWO)
Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Select TWO)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer:...
Which of the following cloud models would BEST meet the needs of the organization?
To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . IaaSC . SaaSD ....
Which of the following is the MOST important consideration for physical security within the datacenter?
When building a hosted datacenter. Which of the following is the MOST important consideration for physical security within the datacenter?A . Security guardsB . CamerasC . Secure enclosuresD . BiometricsView AnswerAnswer: A
Which of the following MOST likely occurred?
A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. Upon Investigation, a security analyst identifies the following: • The legitimate website's IP address is 10.1.1.20 and eRecruit.local resolves to this IP. • The forged website's IP...
Which of the following would BEST meet the CSO's objectives?
A Chief Security Officer's (CSO's) key priorities are to improve preparation response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration...
A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis. In which of the following technologies is the analyst interested?
A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis. In which of the following technologies is the analyst interested?A . SandboxingB . StagingC . DMZD . HoneypotView AnswerAnswer: A
Which of the following is the MOST likely motivation for a script kiddie threat actor?
Which of the following is the MOST likely motivation for a script kiddie threat actor?A . Financial gainB . NotorietyC . Political expressionD . Corporate espionageView AnswerAnswer: B
Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?
Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?A . Non-credentialedB . IntrusiveC . CredentialedD . Non-IntrusiveView AnswerAnswer: B