A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better:

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better:A . validate the vulnerability exists in the organization's network through penetration testing.B . research the appropriate mitigation techniques in a vulnerability database.C . find the software patches that are...

March 9, 2021 No Comments READ MORE +

Exploitation of a system using widely known credentials and network addresses that results in DoS is an example of:

Exploitation of a system using widely known credentials and network addresses that results in DoS is an example of:A . improper error handling.B . default configurations.C . untrained usersD . lack of vendor supportView AnswerAnswer: B

March 8, 2021 No Comments READ MORE +

Which of the following appliance feature would BEST meet the company’s needs?

A technician is evaluating a security appliance solution. The company needs a system that continues to pass traffic if the system crashes. Which of the following appliance feature would BEST meet the company’s needs?A . Fall closed.B . Fall SecureC . Fall SafeD . Fall openView AnswerAnswer: D

March 8, 2021 No Comments READ MORE +

Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

The CSIRT is reviewing the lessons learned from a recent incident A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....

March 8, 2021 No Comments READ MORE +

Which of the following should the analyst perform FIRST?

A security analyst is reviewing the logs from a NGFWs automated correlation engine and sees the following: Which of the following should the analyst perform FIRST?A . Isolate the compromised host from the network.B . Clear the logs and see If the same events reoccur.C . Set up an alert...

March 8, 2021 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year. Over the last five years, the number of devices that were replaced due to loss, damage, or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

March 8, 2021 No Comments READ MORE +

Which of the following measurements do these users fall under?

A company recently installed fingerprint scanners at all entrances to increase the facility’s security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?A ....

March 8, 2021 No Comments READ MORE +

Which of the following wireless configuration is BEST implemented in this scenario?

A technician wants to configure a wireless router at a small office that manages a family-owned dry cleaning business. The router will support five laptops, potential smartphones, a wireless printer, and occasional guests. Which of the following wireless configuration is BEST implemented in this scenario?A . Single SSID with WPA2-EnterpriseB...

March 8, 2021 No Comments READ MORE +

Which of the following documents would provide specific guidance regarding ports and protocols that should be disabled on an operating system?

Which of the following documents would provide specific guidance regarding ports and protocols that should be disabled on an operating system?A . Regulatory requirementsB . Secure configuration guideC . Application installation guidesD . User manualsView AnswerAnswer: B

March 8, 2021 No Comments READ MORE +

Which of the following actions should the application team take?

An Organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot conform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development...

March 8, 2021 No Comments READ MORE +