A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center
DRAG DROP A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. INSTRUCTIONS Drag and drop the applicable controls to each asset type. Controls can be used multiple times and not all placeholders need to be filled. If at...
Which of the following security controls does an iris scanner provide?
Which of the following security controls does an iris scanner provide?A . LogicalB . AdministrativeC . CorrectiveD . PhysicalE . DetectiveF . DeterrentView AnswerAnswer: D
Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)
Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)A . Rainbow table attacks greatly reduce compute cycles at attack time.B . Rainbow tables must include precomputed hashes.C . Rainbow table attacks do not require access to hashed passwords.D . Rainbow table attacks...
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...
Which of the following should the security analyst do to determine if the compromised system still has an active connection?
A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?A . tracertB...
Based on the above information, which of the following types of malware was installed on the user's computer?
After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews the output below: Based on the above information, which of the following types of malware was installed on the user's computer?A ....
Which of the following is the company doing?
A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?A . Transferring the riskB . Accepting the riskC . Avoiding the...
Which of the following attacks specifically impact data availability?
Which of the following attacks specifically impact data availability?A . DDoSB . TrojanC . MITMD . RootkitView AnswerAnswer: A Explanation: Reference: https://www.netscout.com/what-is-ddos
Which of the following occurs when the security of a web application relies on JavaScript for input validation?
Which of the following occurs when the security of a web application relies on JavaScript for input validation?A . The integrity of the data is at risk.B . The security of the application relies on antivirus.C . A host-based firewall is required.D . The application is vulnerable to race conditions.View...
Select the appropriate attack from each drop down list to label the corresponding illustrated attack
HOTSPOT Select the appropriate attack from each drop down list to label the corresponding illustrated attack. Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit. View AnswerAnswer: Explanation: 1: Spear...