Which of the following settings would prevent users from being able to immediately reuse the same passwords?

A network administrator was concerned during an audit that users were able to use the same passwords the day after a password change policy took effect. The following settings are in place: - Users must change their passwords every 30 days. - Users cannot reuse the last 10 passwords. Which...

March 10, 2021 No Comments READ MORE +

Which of the following should the technician implement?

A technician is required to configure updates on a guest operating system while maintaining the ability to quickly revert the changes that were made while testing the updates. Which of the following should the technician implement?A . SnapshotsB . Revert to known stateC . Rollback to known configurationD . Shadow...

March 10, 2021 No Comments READ MORE +

Which of the following implements a stream cipher?

Which of the following implements a stream cipher?A . File-level encryptionB . IKEv2 exchangeC . SFTP data transferD . S/MIME encryptionView AnswerAnswer: D

March 10, 2021 No Comments READ MORE +

The web platform team is deploying a new web application During testing, the team notices the web application is unable to create a TLS connection to the API gateway. The administrator created a firewall rule that permit TLS traffic from the web application server to the API gateway. However, the firewall logs show all traffic is being dropped.

The web platform team is deploying a new web application During testing, the team notices the web application is unable to create a TLS connection to the API gateway. The administrator created a firewall rule that permit TLS traffic from the web application server to the API gateway. However, the...

March 10, 2021 No Comments READ MORE +

Which of the following should be Implemented to fulfill the engineer's requirements?

A network engineer needs to allow an organization's users to conned their laptops to wired and wireless networks from multiple locations and facilities, while preventing unauthorized connections to the corporate networks. Which of the following should be Implemented to fulfill the engineer's requirements?A . Configure VLANs.B . Install a honeypot....

March 10, 2021 No Comments READ MORE +

Which of the following actions should the security analyst take?

A security analyst investigate a report from an employee in the human resources (HR) department who is issues with Internal access. When the security analyst pull the UTM logs for the IP addresses in the HR group, the following activity is shown: Which of the following actions should the security...

March 10, 2021 No Comments READ MORE +

Which of the following should the developer implement to prevent SSL MITM attacks?

A mobile application developer wants to secure an application that transmits sensitive information. Which of the following should the developer implement to prevent SSL MITM attacks?A . StaplingB . ChainingC . SigningD . PinningView AnswerAnswer: D

March 10, 2021 No Comments READ MORE +

Which of the following is an example of federated access management?

Which of the following is an example of federated access management?A . Windows passing user credentials on a peer-to-peer networkB . Applying a new user account with a complex passwordC . Implementing a AAA framework for network accessD . Using a popular website login to provide access to another websiteView...

March 10, 2021 No Comments READ MORE +

Which of the following BEST describes the type of malware the analyst discovered?

During a routine check, a security analyst discovered the script responsible for the backup of the corporate file server had been changed to the following. Which of the following BEST describes the type of malware the analyst discovered?A . Key loggerB . RootkitC . RATD . Logic bombView AnswerAnswer: D

March 10, 2021 No Comments READ MORE +

Which of the following types of controls should be used to reduce the risk created by this scenario?

A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers, the company is unable to upgrade the encryption standard. Which of the following types of...

March 10, 2021 No Comments READ MORE +