Which of the following would resolve this issue without compromising the company's security policies?

A member of the human resources department is searching for candidate resumes and encounters the following error message when attempting to access popular job search websites: Which of the following would resolve this issue without compromising the company's security policies?A . Renew the DNS settings and IP address on the...

February 5, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of this policy violation and the BEST remediation to prevent a reoccurrence'?

An organization has the following written policies: • Users must request approval for non-standard software installation • Administrators will perform all software installations • Software must be installed from a trusted repository A recent security audit identified crypto-currency software installed on one user's machine There are no indications of compromise...

February 5, 2021 No Comments READ MORE +

Exploitation of a system using widely known credentials and network addresses that results in DoS is an example of:

Exploitation of a system using widely known credentials and network addresses that results in DoS is an example of:A . improper error handling.B . default configurations.C . untrained usersD . lack of vendor supportView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

Which of the following BEST explains how the use of configuration templates reduces organization risk?

Which of the following BEST explains how the use of configuration templates reduces organization risk?A . It ensures consistency of configuration for initial system implementation.B . It enables system rollback to a last known-good state if patches break functionality.C . It facilitates fault tolerance since applications can be migrated across...

February 4, 2021 No Comments READ MORE +

Which of the following should be configured on the VPN concentrator?

A systems administrator needs to configure an SSL remote access VPN according to the following organizational guidelines: • The VPN must support encryption of header and payload. • The VPN must route all traffic through the company's gateway. Which of the following should be configured on the VPN concentrator?A ....

February 4, 2021 No Comments READ MORE +

Based on the above information, which of the following types of malware was discovered?

A company notices that at 10 a.m. every Thursday, three users' computers become inoperable. The security analyst team discovers a file called where.pdf.exe that runs on system startup. The contents of where.pdf.exe are shown below: @echo off if [c:file.txt] deltree C: Based on the above information, which of the following...

February 4, 2021 No Comments READ MORE +

Which of the following controls should security put in place?

The security office has had reports of increased tailgating in the datacenter. Which of the following controls should security put in place?A . MantrapB . Cipher lockC . Fingerprint scannerD . Badge readerView AnswerAnswer: A

February 4, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of not receiving any vulnerabilities on the network?

Ann a security analyst from a large organization has been instructed to use another more effective scanning tool After installing the tool on her desktop she started a full vulnerability scan After running the scan for eight hours. Ann finds that there were no vulnerabilities identified. Which of the following...

February 4, 2021 No Comments READ MORE +

Which of the following BEST describe this type of attack?

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, internet and VoIP services are restored, only to go offline again at random intervals. typically, within four minutes of services being restored. Outages continue throughout the day. impacting all...

February 4, 2021 No Comments READ MORE +

Which of the following should the analyst do FIRST?

A forensics analyst is investigating a hard drive for evidence of suspected illegal activity. Which of the following should the analyst do FIRST?A . Create a hash of the hard drive.B . Export the Internet history.C . Save a copy of the case number and date as a text file...

February 4, 2021 1 Comment READ MORE +