Which of the following deployment models should the organization use to BEST meet these requirements?
An organization wishes to allow its users to select devices for business use but does not want to overwhelm the service desk with requests for too many different device types and models. Which of the following deployment models should the organization use to BEST meet these requirements?A . VDI environmentB...
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the windows/Currentversion/Run registry key?
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the windows/Currentversion/Run registry key?A . PersistenceB . PivotingC . Active reconnaissanceD . Escalation of privilegeView AnswerAnswer: D
Which of the following tactics would an attacker MOST likely use in this scenario?
Company engineers regularly participate in a public Internet forum with other engineers throughout the industry. Which of the following tactics would an attacker MOST likely use in this scenario?A . Watering-hole attackB . Credential harvestingC . Hybrid warfareD . PharmingView AnswerAnswer: A
Which of the following has MOST likely occurred on Ann's computer?
Ann. a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. Which of the following has...
Which of the following represents a multifactor authentication system?
Which of the following represents a multifactor authentication system?A . An iris scanner coupled with a palm print reader and fingerprint scanner with liveness detection.B . A secret passcode that prompts the user to enter a secret key if entered correctly.C . A digital certificate on a physical token that...
Which of the following network attacks Is the researcher MOST likely experiencing?
A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message: Which of the following...
Which of the following should the administrator use?
A systems administrator needs to install the same X.509 certificate on multiple servers. Which of the following should the administrator use?A . Key escrowB . A self-signed certificateC . Certificate chainingD . An extended validation certificateView AnswerAnswer: D
Which of the following is the BEST method to prevent data compromise?
An organization handling highly condential information needs to update its systems. Which of the following is the BEST method to prevent data compromise?A . WipingB . DegaussingC . ShreddingD . PurgingView AnswerAnswer: C
Which of the following BEST describes what the rsa portion of the command represents?
A systems administrator just issued the ssh-keygen -t rsa command on a Linux terminal. Which of the following BEST describes what the rsa portion of the command represents?A . A key generation algorithmB . A hashing algorithmC . A public key infrastructure typeD . A certificate authority typeView AnswerAnswer: A
Which of the following would be the SAFEST next step to address the issue?
After deploying an antivirus solution on some network-isolated industrial computers, the service desk team received a trouble ticket about the following message being displayed on then computer’s screen: Which of the following would be the SAFEST next step to address the issue?A . Immediately delete the detected file from the...