Which of the following attacks does this describe?

A malicious actor compromises a legitimate website, configuring it to deliver malware to visitors of the website. Which of the following attacks does this describe?A . WhalingB . Watering holeC . ImpersonationD . SpoofingView AnswerAnswer: A

December 31, 2020 No Comments READ MORE +

Which of the following is the systems administrator MOST likely to suggest to the Chief Information Security Officer (CISO) based on the above?

A company recently updated its website to increase sales. The new website uses PHP forms for leads and provides a directory with sales staff and their phone numbers. A systems administrator is concerned about the new website and provides the following log to support the concern: Which of the following...

December 31, 2020 No Comments READ MORE +

Which of the following identity access methods creates a cookie on the rst logic to a central authority to allow logins to subsequent applications without referring credentials?

Which of the following identity access methods creates a cookie on the rst logic to a central authority to allow logins to subsequent applications without referring credentials?A . Multifactor authenticationB . Transitive trustC . Federated accessD . Single sign-onView AnswerAnswer: D

December 31, 2020 No Comments READ MORE +

Which of the following is MOST likely the issue, and what should be done?

An organization has the following password policies: • Passwords must be at least 16 characters long. • Three tailed login attempts will lock the account (or live minutes. • Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol. A database server was recently breached, and the...

December 30, 2020 No Comments READ MORE +

Witch of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?

A systems administrator needs to integrate multiple loT and small embedded devices into the company's wireless network securely. Witch of the following should the administrator implement to ensure low-power and legacy devices can connect to the wireless network?A . WPSB . WPAC . EAP-FASTD . 802IXView AnswerAnswer: A

December 30, 2020 No Comments READ MORE +

Which of the following should be installed to resolve these issues?

After a systems administrator installed and configured Kerberos services, several users experienced authentication issues. Which of the following should be installed to resolve these issues?A . RADIUS serverB . NTLM serviceC . LDAP serviceD . NTP serverView AnswerAnswer: D

December 30, 2020 No Comments READ MORE +

Which of the following is MOST likely the issue?

A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server Soon after, the help desk begins receiving calls from users who are unable to log in After further investigation, it becomes clear that no users...

December 29, 2020 No Comments READ MORE +

Given this information, which of the following is the SLE?

An organization is looking to build its second head ofce in another city. which has a history of ooding with an average of two oods every ‘I00 years. The estimated building cost is $1 million. and the estimated damage due to flooding is half of the buildings cost. Given this...

December 29, 2020 No Comments READ MORE +

Which of the following should the engineer do to determine the issue?

A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should...

December 29, 2020 No Comments READ MORE +

Which of the following BEST describes this type of penetration test?

An authorized user is conducting a penetration scan of a system for an organization. The tester has a set of network diagrams. Source code, version numbers of applications. and other information about the system. Including hostnames and network addresses. Which of the following BEST describes this type of penetration test?A...

December 29, 2020 No Comments READ MORE +