Which of the following should the technician implement to BEST reduce the risk of this happening in the future?

A company uses WPA2-PSK, and it appears there are multiple unauthorized connected to the wireless network. A technician suspects this is because the wireless passwords has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the future?A...

December 26, 2020 No Comments READ MORE +

Which of the following BEST explains why a development environment should have the same database server secure baseline that exists in production even if there is no PII in the database?

Which of the following BEST explains why a development environment should have the same database server secure baseline that exists in production even if there is no PII in the database?A . Without the same configuration in both development and production, there are no assurances that changes made in development...

December 26, 2020 No Comments READ MORE +

Which of the following concepts are described above?

Given the information below: MD5HASH document.doc 049eab40fd36caadlfab10b3cdf4a883 MD5HASH image.jpg 049eab40fd36caadlfab10b3cdf4a883. Which of the following concepts are described above? (Choose two.)A . SaltingB . CollisionC . SteganographyD . HashingE . Key stretchingView AnswerAnswer: B,D

December 26, 2020 No Comments READ MORE +

Which of the following tools would BEST assist in identifying potential attacks?

An administrator is beginning an authorized penetration test of a corporate network. Which of the following tools would BEST assist in identifying potential attacks?A . NetstatB . Honey potC . Company directoryD . NmapView AnswerAnswer: D

December 26, 2020 No Comments READ MORE +

Which of the following would provide a technical control to prevent this activity from occurring?

While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times on the day the passwords are set to expire. The analyst suspects they are cycling their passwords to circumvent current password controls. Which of the following would provide a...

December 26, 2020 No Comments READ MORE +

Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?

The CSIRT is reviewing the lessons learned from a recent incident A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....

December 26, 2020 No Comments READ MORE +

Which of the following methods would BEST fit the needs of the CISO?

A chief information security officer (CISO) asks the security architect to design a method for contractors to access the company's internal wiki, corporate directory, and email services securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of...

December 26, 2020 No Comments READ MORE +

Which of the following is an element of the BIA that this action is addressing?

A company is performing an analysis of the corporate enterprise network with the intent of identifying any one system, person, function, or service that, when neutralized, will cause or cascade disproportionate damage to the company’s revenue, referrals, and reputation. Which of the following is an element of the BIA that...

December 26, 2020 No Comments READ MORE +

Which of the following algorithms should the analyst use to validate the integrity of the file?

A computer forensics analyst collected a flash drive that contained a single file with 500 pages of text. Which of the following algorithms should the analyst use to validate the integrity of the file?A . 3DESB . AESC . MD5D . RSAView AnswerAnswer: C

December 26, 2020 No Comments READ MORE +

Which of the following actions should the employee take?

An organization has created a review process to determine how to best handle data with different sensitivity levels. The process includes the following requirements: • Soft copy Pll must be encrypted. • Hard copy Pll must be placed In a locked container. • Soft copy PHI must be encrypted and...

December 25, 2020 No Comments READ MORE +