Which of the following BEST explains ‘likelihood of occurrence'?
Which of the following BEST explains ‘likelihood of occurrence'?A . The chance that an event will happen regardless of how much damage it may causeB . The overall impact to the organization once all factors have been consideredC . The potential for a system to have a weakness or aw...
Which of the following MOST accurately describes the security risk presented in this situation?
A government organization recently contacted three different vendors to obtain cost quotes for a desktop PC refresh. The quote from one of the vendors was significantly lower than the other two and was selected for the purchase. When the PCs arrived, a technician determined some NICs had been tampered with....
Which of the following is the BEST way for the organization to integrate with the cloud application?
An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?A . Upload...
Which of the following is the BEST option to fulfill the administrator's objective?
A security administrator wants to better prepare the incident response team for possible security events. The IRP has been updated and distributed to incident response team members. Which of the following is the BEST option to fulfill the administrator's objective?A . identify the members' roles and responsibilities.B . Select a...
Which of the following should configure to enforce the use for client-site certificates?
A technician wants to implement PKI-based authentication on an enterprise wireless network. Which of the following should configure to enforce the use for client-site certificates?A . 802.1X with PEAPB . WPA2-PSKC . EAP-TLSD . RADIUS FederationView AnswerAnswer: B
Which of the following should be acquired LAST?
An incident responder is preparing to acquire images and files from a workstation that has been compromised. The workstation is still powered on and running. Which of the following should be acquired LAST?A . Application files on hard diskB . Processor cacheC . Processes in running memoryD . Swap spaceView...
Which of the following should be reviewed to mitigate this problem?
A security analyst has recently deployed an MDM solution that requires biometric authentication for company-issued smartphones As the solution was implemented the help desk has seen a dramatic increase in calls by employees frustrated that company-issued phones take several attempts to unlock using the fingerprint scanner. Which of the following...
Which of the following types of malware is this example of?
A security consultant is analyzing data from a recent compromise. The following data points are documented • Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user. • The data was unreadable by any known...
Which of the following types of malware was installed on the call center users’ systems?
Some call center representatives ‘workstations were recently updated by a contractor, who was able to collect customer information from the call center workstations. Which of the following types of malware was installed on the call center users’ systems?A . AdwareB . Logic bombC . TrojanD . SpywareView AnswerAnswer: D
Which of the following BEST describes the scanned environment?
Given the following output: Which of the following BEST describes the scanned environment?A . A host was identified as a web server that is hosting multiple domains.B . A host was scanned, and web-based vulnerabilities were found.C . A connection was established to a domain, and several redirect connections were...