Which of the following methods would BEST prevent the exfiltration of data?

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).A . VPNB . Drive encryptionC . Network firewallD . File-level encryptionE . USB blockerF . MFAView AnswerAnswer:...

March 5, 2021 No Comments READ MORE +

Which of the following steps in the incident response process has the administrator just completed?

After discovering a security incident and removing the affected files, an administrator disabled an unneeded service that led to the breach. Which of the following steps in the incident response process has the administrator just completed?A . ContainmentB . EradicationC . RecoveryD . IdentificationView AnswerAnswer: B

March 5, 2021 No Comments READ MORE +

Given the above output, which of the following is the MOST likely cause of this compromise?

A security administrator is investigating a possible account compromise. The administrator logs onto a desktop computer, executes the command notepad.exe c:Tempqkakforlkgfkja.1og, and reviews the following: Lee,rI have completed the task that was assigned to merrespectfullyrJohnr https://www.portal.comrjohnuserrilovemycat2 Given the above output, which of the following is the MOST likely cause of...

March 5, 2021 No Comments READ MORE +

Which of the following implements a lossy algorithm?

Which of the following implements a lossy algorithm?A . BlowfishB . ROT13C . Diffie-HellmanD . SHAView AnswerAnswer: D

March 5, 2021 No Comments READ MORE +

Which of the following should be reviewed to mitigate this problem?

A security analyst has recently deployed an MDM solution that requires biometric authentication for company-issued smartphones. As the solution was implemented the help desk has seen a dramatic increase in calls by employees frustrated that company-issued phones take several attempts to unlock using the fingerprint scanner. Which of the following...

March 5, 2021 No Comments READ MORE +

Which of the following types of malware was installed on the call center users’ systems?

Some call center representatives ‘workstations were recently updated by a contractor, who was able to collect customer information from the call center workstations. Which of the following types of malware was installed on the call center users’ systems?A . AdwareB . Logic bombC . TrojanD . SpywareView AnswerAnswer: D

March 5, 2021 No Comments READ MORE +

Which of the following techniques BEST accomplish this goal?

A security analyst is implementing mobile device security for a company. To save money, management has decided on a BYOD model. The company is most concerned with ensuring company data will not be exposed if a phone is lost or stolen. Which of the following techniques BEST accomplish this goal?...

March 5, 2021 No Comments READ MORE +

Which of the following is the BEST solution?

A company is implementing a remote access portal so employees can work remotely from home. The company wants to implement a solution that would securely integrate with a third party. Which of the following is the BEST solution?A . SAMLB . RADIUSC . Secure tokenD . TACACS+View AnswerAnswer: B

March 5, 2021 No Comments READ MORE +

Which of the following access control account practices would BEST be used in this situation?

A systems developer needs to provide machine-to-machine interface between an application and a database server in the production environment. This interface will exchange data once per day. Which of the following access control account practices would BEST be used in this situation?A . Establish a privileged interface group and apply...

March 5, 2021 No Comments READ MORE +

Which of the following help find current and future gaps in an existing COOP?

Which of the following help find current and future gaps in an existing COOP?A . Vulnerability assessmentB . Lessons learnedC . Tabletop exerciseD . After-action reportView AnswerAnswer: D

March 5, 2021 No Comments READ MORE +