Which of the following protocols must be supported by both the RADIUS server and the WAPs?

A systems engineer is setting up a RADIUS server to support a wireless network that uses certificate authentication. Which of the following protocols must be supported by both the RADIUS server and the WAPs?A . CCMPB . TKIPC . WPSD . EAPView AnswerAnswer: D

March 11, 2021 No Comments READ MORE +

Which of the following would allow the team to determine the scope of future incidents?

A coding error has been discovered on a customer-facing website. The error causes each request to return confidential PHI data for the incorrect organization. The IT department is unable to identify the specific customers who are affected. As a result, all customers must be notified of the potential breach. Which...

March 11, 2021 No Comments READ MORE +

Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Select TWO)

Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Select TWO)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer:...

March 11, 2021 No Comments READ MORE +

Which of the following cloud models would BEST meet the needs of the organization?

To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . IaaSC . SaaSD ....

March 11, 2021 No Comments READ MORE +

Which of the following is the MOST important consideration for physical security within the datacenter?

When building a hosted datacenter. Which of the following is the MOST important consideration for physical security within the datacenter?A . Security guardsB . CamerasC . Secure enclosuresD . BiometricsView AnswerAnswer: A

March 11, 2021 No Comments READ MORE +

Which of the following MOST likely occurred?

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. Upon Investigation, a security analyst identifies the following: • The legitimate website's IP address is 10.1.1.20 and eRecruit.local resolves to this IP. • The forged website's IP...

March 11, 2021 No Comments READ MORE +

Which of the following would BEST meet the CSO's objectives?

A Chief Security Officer's (CSO's) key priorities are to improve preparation response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration...

March 11, 2021 No Comments READ MORE +

A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis. In which of the following technologies is the analyst interested?

A security analyst needs a solution that can execute potential malware in a restricted and isolated environment for analysis. In which of the following technologies is the analyst interested?A . SandboxingB . StagingC . DMZD . HoneypotView AnswerAnswer: A

March 11, 2021 No Comments READ MORE +

Which of the following is the MOST likely motivation for a script kiddie threat actor?

Which of the following is the MOST likely motivation for a script kiddie threat actor?A . Financial gainB . NotorietyC . Political expressionD . Corporate espionageView AnswerAnswer: B

March 10, 2021 No Comments READ MORE +

Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?

Which of the following types of vulnerability scans typically returns more detailed and thorough insights into actual system vulnerabilities?A . Non-credentialedB . IntrusiveC . CredentialedD . Non-IntrusiveView AnswerAnswer: B

March 10, 2021 No Comments READ MORE +