Which of the following security concerns need to be identified and mitigated?
A security administrator is investigating a report that a user is receiving suspicious emails. The user’s machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)A . VishingB . WhalingC . Spear phishingD . PharmingE . War dialingF ....
Which of the following should the security analyst request NEXT based on the UTM firewall analysis?
The application team within a company is asking the security team to investigate why its application is slow after an upgrade. The source of the team's application is 10.13.136.9. and the destination IP is 10.17.36.5. The security analyst pulls the logs from the endpoint security software but sees nothing is...
From which of the following did the alert MOST likely originate?
A Security analyst has received an alert about PII being sent via email. The analyst’s Chief Information Security Officer (CISO) has made it clear that PII must be handled with extreme care. From which of the following did the alert MOST likely originate?A . S/MIMEB . DLPC . IMAPD ....
Which of the following methods would BEST fit the needs of the CISO?
A chief information security officer (CISO) asks the security architect to design a method for contractors to access the company's internal wiki, corporate directory, and email services securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of...
Which of the following tactics would an attacker MOST likely use in this scenario?
Company engineers regularly participate in a public Internet forum with other engineers throughout the industry. Which of the following tactics would an attacker MOST likely use in this scenario?A . Watering-hole attackB . Credential harvestingC . Hybrid warfareD . PharmingView AnswerAnswer: A
Which of the following configurations would BEST support this requirement?
A systems administrator has installed a new UTM that is capable of inspecting SSL/TLS traffic for malicious payloads. All inbound network traffic coming from the Internet and terminating on the company’s secure web servers must be inspected. Which of the following configurations would BEST support this requirement?A . The web...
Which of the following types of malware MOST likely caused this to occur?
The help desk received a call from a user who was trying to access a set of files from the day before but received the following error message: File format not recognized. Which of the following types of malware MOST likely caused this to occur?A . RansomwareB . Polymorphic virusC...
Which of the following will the CISO MOST likely recommend to mitigate this risk?
A Chief Information Security Officer (CISO) is concerned about the organization's ability to continue business operations in the event of a prolonged DDoS attack on its local datacenter that consumes server resources. Which of the following will the CISO MOST likely recommend to mitigate this risk?A . Upgrade the bandwidth...
Which of the following is being outlined?
An organization is drafting an IRP and needs to determine which employees have the authority to take systems offline during an emergency situation. Which of the following is being outlined?A . Reporting and escalation proceduresB . Permission auditingD . Roles and responsibilitiesE . Communication methodologiesView AnswerAnswer: C
Which of the following should the technician implement?
A technician is required to configure updates on a guest operating system while maintaining the ability to quickly revert the changes that were made while testing the updates. Which of the following should the technician implement?A . SnapshotsB . Revert to known stateC . Rollback to known configurationD . Shadow...