Which of the following is MOST likely the cause?
A user is unable to obtain an IP address from the corporate DHCP server. Which of the following is MOST likely the cause?A . Default configurationB . Resource exhaustionC . Memory overflowD . Improper input handlingView AnswerAnswer: B
A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans:
A credentialed vulnerability scan is often preferred over a non-credentialed scan because credentialed scans:A . generates more false positives.B . rely solely on passive measures.C . are always non-intrusive.D . provide more accurate data.View AnswerAnswer: C
Which of the following types of vulnerability scans should be conducted?
A security administrator wants to determine if a company's web servers have the latest operating system and application patches installed. Which of the following types of vulnerability scans should be conducted?A . Non-credentialedB . PassiveC . PortD . CredentialedE . Red teamF . ActiveView AnswerAnswer: D
Which of the following would be the BEST solution for the CIO to implement?
A Chief Information Officer (CIO) is concerned that encryption keys might be exfiltrated by a contractor. The CIO wants to keep control over key visibility and management. Which of the following would be the BEST solution for the CIO to implement?”A . HSMB . CAC . SSHD . SSLView AnswerAnswer:...
Which of the following BEST describes the security concerns for this decision?
An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?A . Access to the organization’s servers could be exposed to other cloud-provider clients.B . The cloud vendor is a new attack vector within the...
Which of the following is the router experiencing?
A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?A . DDoS attackB...
Which of the following is the BEST explanation for these alerts?
Topic 1, Exam Pool A A security analyst received an after-hours alert indicating that a large number of accounts with the suffix "admin’’ were locked out. The accounts were all locked out after five unsuccessful login attempts, and no other accounts on the network triggered the same alert. Which of...
Which of the following represents a multifactor authentication system?
Which of the following represents a multifactor authentication system?A . An iris scanner coupled with a palm print reader and fingerprint scanner with liveness detection.B . A secret passcode that prompts the user to enter a secret key if entered correctly.C . A digital certificate on a physical token that...
Which of the following is the FIRST step the security professional should take?
A security professional wants to test a piece of malware that was isolated on a user’s computer to document its effect on a system. Which of the following is the FIRST step the security professional should take?A . Create a sandbox on the machine.B . Open the file and run...
If a current private key is compromised, which of the following would ensure it cannot be used to decrypt all historical data?
If a current private key is compromised, which of the following would ensure it cannot be used to decrypt all historical data?A . Perfect forward secrecyB . Elliptic-curve cryptographyC . Key stretchingD . Homomorphic encryptionView AnswerAnswer: D