Which of the following attacks does this describe?
A malicious actor compromises a legitimate website, configuring it to deliver malware to visitors of the website. Which of the following attacks does this describe?A . WhalingB . Watering holeC . ImpersonationD . SpoofingView AnswerAnswer: A
Which of the following is the systems administrator MOST likely to suggest to the Chief Information Security Officer (CISO) based on the above?
A company recently updated its website to increase sales. The new website uses PHP forms for leads and provides a directory with sales staff and their phone numbers. A systems administrator is concerned about the new website and provides the following log to support the concern: Which of the following...
Which of the following identity access methods creates a cookie on the rst logic to a central authority to allow logins to subsequent applications without referring credentials?
Which of the following identity access methods creates a cookie on the rst logic to a central authority to allow logins to subsequent applications without referring credentials?A . Multifactor authenticationB . Transitive trustC . Federated accessD . Single sign-onView AnswerAnswer: D
Which of the following is MOST likely the issue, and what should be done?
An organization has the following password policies: • Passwords must be at least 16 characters long. • Three tailed login attempts will lock the account (or live minutes. • Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol. A database server was recently breached, and the...
Witch of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?
A systems administrator needs to integrate multiple loT and small embedded devices into the company's wireless network securely. Witch of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?A . WPSB . WPAC . EAP-FASTD . 802IXView AnswerAnswer: A
Which of the following should be installed to resolve these issues?
After a systems administrator installed and configured Kerberos services, several users experienced authentication issues. Which of the following should be installed to resolve these issues?A . RADIUS serverB . NTLM serviceC . LDAP serviceD . NTP serverView AnswerAnswer: D
Which of the following is MOST likely the issue?
A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server Soon after, the help desk begins receiving calls from users who are unable to log in After further investigation, it becomes clear that no users...
Given this information, which of the following is the SLE?
An organization is looking to build its second head ofce in another city. which has a history of ooding with an average of two oods every ‘I00 years. The estimated building cost is $1 million. and the estimated damage due to flooding is half of the buildings cost. Given this...
Which of the following should the engineer do to determine the issue?
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should...
Which of the following BEST describes this type of penetration test?
An authorized user is conducting a penetration scan of a system for an organization. The tester has a set of network diagrams. Source code, version numbers of applications. and other information about the system. Including hostnames and network addresses. Which of the following BEST describes this type of penetration test?A...