Which of the following should the company implement to ease these concerns?
A company has had a BYOD policy in place for many years and now wants to roll out an MDM solution. The company has decided that end users who wish to utilize their personal devices for corporate use must opt in to the MDM solution. End users are voicing concerns...
Which of the following IR phases should the team member conduct NEXT?
A member of the IR team has identified an infected computer. Which of the following IR phases should the team member conduct NEXT?A . EradicationB . RecoveryC . Lessons learnedD . ContainmentView AnswerAnswer: D
Which of the following has MOST likely occurred on Ann's computer?
Ann. a user, reported to the service desk that many files on her computer will not open or the contents are not readable. The service desk technician asked Ann if she encountered any strange messages on boot-up or login, and Ann indicated she did not. Which of the following has...
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the windows/Currentversion/Run registry key?
Which of the following penetration testing concepts is an attacker MOST interested in when placing the path of a malicious file in the windows/Currentversion/Run registry key?A . PersistenceB . PivotingC . Active reconnaissanceD . Escalation of privilegeView AnswerAnswer: D
Which of the following methods would BEST prevent the exfiltration of data?
A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).A . VPNB . Drive encryptionC . Network firewallD . File-level encryptionE . USB blockerF . MFAView AnswerAnswer:...
Which of the following should the administrator configure?
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate devices using PKI. Which of the following should the administrator configure?A . A captive portalB . PSKC . 802.1XD . WPSView AnswerAnswer: D
A transitive trust:
A transitive trust:A . is automatically established between a parent and a child.B . is used to update DNS records.C . allows access to untrusted domains.D . can be used in place of a hardware token for logins.View AnswerAnswer: A
Which of the following security concepts is the systems administrator implementing?
A systems administrator has created network file shares for each department with associated security groups for each role within the organization. Which of the following security concepts is the systems administrator implementing?A . Separation of dutiesB . Permission auditingC . Least privilegeD . Standard naming conventionView AnswerAnswer: C
Which of the following command line tools would be BEST to identify the services running in a server?
Which of the following command line tools would be BEST to identify the services running in a server?A . TracerouteB . NslookupC . IpconfigD . NetstatView AnswerAnswer: D
Which of the following MOST likely occurred?
After being alerted to potential anomalous activity related to trivial DNS lookups, a security analyst looks at the following output of implemented firewall rules: The analyst notices that the expected policy has no hit count for the day. Which of the following MOST likely occurred?A . Data execution prevention is...