Which of the following is an example of the second A in the AAA model?

Which of the following is an example of the second A in the AAA model?A . The encryption protocol successfully completes the handshake and establishes a connectionB . The one-time password is keyed in, and the login system grants access.C . The event log records a successful login with a...

February 11, 2021 No Comments READ MORE +

A company has a backup site with equipment on site without any data. This is an example of:

A company has a backup site with equipment on site without any data. This is an example of:A . a hot site.B . a cold site.C . a hot standby.D . a warrn site.View AnswerAnswer: B

February 11, 2021 No Comments READ MORE +

Which of the following can be used to increase the time needed to brute force a hashed password?

Which of the following can be used to increase the time needed to brute force a hashed password?A . BCRYPTB . ECDHEC . Elliptic curveD . Diffie-HellmanView AnswerAnswer: A

February 11, 2021 No Comments READ MORE +

Which of the following would secure the credentials from sniffing?

A network technician discovered the usernames and passwords used for network device configuration have been compromised by a user with a packet sniffer. Which of the following would secure the credentials from sniffing?A . Implement complex passwords.B . Use SSH for remote access.C . Configure SNMPv2 for device management.D ....

February 11, 2021 No Comments READ MORE +

Which of the following types of malware is MOST likely responsible for producing the SIEM alerts?

An incident response analyst in a corporate security operations center receives a phone call from an SOC analyst. The SOC analyst explains the help desk recently reimaged a workstation that was suspected of being infected with an unknown type of malware; however, even after reimaging, the host continued to generate...

February 11, 2021 No Comments READ MORE +

Which of the following MOST likely occurred?

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site. Upon Investigation, a security analyst identifies the following: • The legitimate website's IP address is 10.1.1.20 and eRecruit.local resolves to this IP. • The forged website's IP...

February 11, 2021 No Comments READ MORE +

Which of the following would offer the BEST protection against offline brute force attacks?

A security administrator is choosing an algorithm to generate password hashes. Which of the following would offer the BEST protection against offline brute force attacks?A . MD5B . 3DESC . AESD . SHA-1View AnswerAnswer: D

February 11, 2021 No Comments READ MORE +

A preventive control differs from a compensating control in that a preventive control is:

A preventive control differs from a compensating control in that a preventive control is:A . put in place to mitigate a weakness in a user control.B . deployed to supplement an existing control that is EOD . relied on to address gaps in the existing control structure.E . designed to...

February 11, 2021 No Comments READ MORE +

Which of the following BEST describes this type of message?

An attachment that was emailed to finance employees contained an embedded message. The security administrator investigates and finds the intent was to conceal the embedded information from public view. Which of the following BEST describes this type of message?A . ObfuscationB . SteganographyC . DiffusionD . BCRYPTView AnswerAnswer: A

February 11, 2021 No Comments READ MORE +

Which of the following practices would BEST help to prevent this situation in the future?

A company employee recently retired, and there was a schedule delay because no one was capable of filling the employee’s position. Which of the following practices would BEST help to prevent this situation in the future?A . Mandatory vacationB . Separation of dutiesC . Job rotationD . Exit interviewsView AnswerAnswer:...

February 11, 2021 No Comments READ MORE +