A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center

DRAG DROP A security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. INSTRUCTIONS Drag and drop the applicable controls to each asset type. Controls can be used multiple times and not all placeholders need to be filled. If at...

May 23, 2021 No Comments READ MORE +

Which of the following security controls does an iris scanner provide?

Which of the following security controls does an iris scanner provide?A . LogicalB . AdministrativeC . CorrectiveD . PhysicalE . DetectiveF . DeterrentView AnswerAnswer: D

May 23, 2021 No Comments READ MORE +

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Choose two.)A . Rainbow table attacks greatly reduce compute cycles at attack time.B . Rainbow tables must include precomputed hashes.C . Rainbow table attacks do not require access to hashed passwords.D . Rainbow table attacks...

May 23, 2021 No Comments READ MORE +

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...

May 23, 2021 No Comments READ MORE +

Which of the following should the security analyst do to determine if the compromised system still has an active connection?

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?A . tracertB...

May 23, 2021 No Comments READ MORE +

Based on the above information, which of the following types of malware was installed on the user's computer?

After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews the output below: Based on the above information, which of the following types of malware was installed on the user's computer?A ....

May 23, 2021 No Comments READ MORE +

Which of the following is the company doing?

A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?A . Transferring the riskB . Accepting the riskC . Avoiding the...

May 23, 2021 No Comments READ MORE +

Which of the following attacks specifically impact data availability?

Which of the following attacks specifically impact data availability?A . DDoSB . TrojanC . MITMD . RootkitView AnswerAnswer: A Explanation: Reference: https://www.netscout.com/what-is-ddos

May 22, 2021 No Comments READ MORE +

Which of the following occurs when the security of a web application relies on JavaScript for input validation?

Which of the following occurs when the security of a web application relies on JavaScript for input validation?A . The integrity of the data is at risk.B . The security of the application relies on antivirus.C . A host-based firewall is required.D . The application is vulnerable to race conditions.View...

May 22, 2021 No Comments READ MORE +

Select the appropriate attack from each drop down list to label the corresponding illustrated attack

HOTSPOT Select the appropriate attack from each drop down list to label the corresponding illustrated attack. Instructions: Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit. View AnswerAnswer: Explanation: 1: Spear...

May 22, 2021 No Comments READ MORE +