Which of the following is the MOST likely cause for this?

When accessing a popular website, a user receives a warning that the certificate for the website is not valid. Upon investigation, it was noted that the certificate is not revoked and the website is working fine for other users. Which of the following is the MOST likely cause for this?A...

February 18, 2021 No Comments READ MORE +

Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?

During an incident, a company's CIRT determines it is necessary to observe the continued network-based transactions between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk...

February 18, 2021 No Comments READ MORE +

Which of the following is the BEST control to address this audit finding?

A company needs to fix some audit findings related to its physical security. A key finding was that multiple people could physically enter a location at the same time. Which of the following is the BEST control to address this audit finding?A . Faraday cageB . MantrapC . BiometricsD ....

February 18, 2021 No Comments READ MORE +

Given the file contents and the system’s issues, which of the following types of malware is present?

A company is experiencing an increasing number of systems that are locking up on Windows startup. The security analyst clones a machine, enters into safe mode, and discovers a file in the startup process that runs Wstart.bat. @echo off :asdhbawdhbasdhbawdhb start notepad.exe start notepad.exe start calculator.exe start calculator.exe goto asdhbawdhbasdhbawdhb...

February 18, 2021 No Comments READ MORE +

Which of the following would be the BEST combination to reduce the risks discovered?

A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30%...

February 17, 2021 No Comments READ MORE +

Which of the following is the MOST likely reason for the issue?

A user from the financial aid office is having trouble interacting with the finaid directory on the university’s ERP system. The systems administrator who took the call ran a command and received the following output: Subsequently, the systems administrator has also confirmed the user is a member of the finaid...

February 17, 2021 No Comments READ MORE +

Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to ensure the data will not be removed remotely?

Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to ensure the data will not be removed remotely?A . Air gapB . Secure cabinetC . Faraday cageD . SafeView AnswerAnswer: C

February 17, 2021 No Comments READ MORE +

Which of the following would BEST meet the CSO's objectives?

A Chief Security Officer's (CSO's) key priorities are to improve preparation response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration...

February 17, 2021 No Comments READ MORE +

Which of the following would be MOST appropriate to mitigate the attack?

A security engineer is concerned about susceptibility to HTTP downgrade attacks because the current customer portal redirects users from port 80 to the secure site on port 443. Which of the following would be MOST appropriate to mitigate the attack?A . DNSSECB . HSTSC . Certificate pinningD . OCSPView AnswerAnswer:...

February 17, 2021 No Comments READ MORE +

Which of the following configuration should the engineer choose?

A systems engineer is configuring a wireless network. The network must not require installation of third-party software. Mutual authentication of the client and the server must be used. The company has an internal PKI. Which of the following configuration should the engineer choose?A . EAP-TLSB . EAP-TTLSC . EAP-FASTD ....

February 16, 2021 No Comments READ MORE +