Which of the following does the administrator need to implement to ensure this can be accomplished?
A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the events occurred and were collected. Which of the following does the administrator need to implement to ensure this can be accomplished?A . TOTPB . TKJPC . NTPD ....
Which of the following impacts MOST likely results from poor exception handling?
Which of the following impacts MOST likely results from poor exception handling?A . Widespread loss of confidential dataB . Network-wide resource exhaustionC . Privilege escalationD . Local disruption of servicesView AnswerAnswer: D
Which of the following protocols would BEST meet this objective?
As part of a corporate merger. two companies are combining resources. As a result, they must transfer files through the internet in a secure manner. Which of the following protocols would BEST meet this objective? (Choose two.)A . LDAPSB . SFTPC . HTTPSD . DNSSECE . SRTPView AnswerAnswer: B,C
Which of the following actions should the employee take?
An organization has created a review process to determine how to best handle data with different sensitivity levels. The process includes the following requirements: • Soft copy Pll must be encrypted. • Hard copy Pll must be placed In a locked container. • Soft copy PHI must be encrypted and...
Which of the following solutions will BEST fit this organization's requirements?
An organization is updating its access control standards for SSL VPN login to include multifactor authentication. The security administrator assigned to this project has been given the following guidelines to use when selecting a solution • High security • Lowest false acceptance rate • Quick provisioning time for remote users...
Which of the following certificate types should the developer install if the company is MOST interested in minimizing costs?
A developer is building a new web portal for internal use. The web portal will only the accessed by internal users and will store operational documents. Which of the following certificate types should the developer install if the company is MOST interested in minimizing costs?A . WildcardB . Code signingC...
Which of the following should the company use?
A company recently experienced a network security breach and wants to apply two-factor authentication to secure its network. Which of the following should the company use? (Select TWO)A . User ID and passwordB . Cognitive password and OTPC . Fingerprint scanner and voice recognitionD . Smart card and PINE ....
Which of the following BEST describes the type of malware the analyst discovered?
During a routine check, a security analyst discovered the script responsible for the backup of the corporate file server had been changed to the following. Which of the following BEST describes the type of malware the analyst discovered?A . Key loggerB . RootkitC . RATD . Logic bombView AnswerAnswer: D
Which of the following types of malware was installed on the call center users’ systems?
Some call center representatives ‘workstations were recently updated by a contractor, who was able to collect customer information from the call center workstations. Which of the following types of malware was installed on the call center users’ systems?A . AdwareB . Logic bombC . TrojanD . SpywareView AnswerAnswer: D
Which of the following signatures should be installed on the NIPS'?
A NIPS administrator needs to install a new signature to observe the behavior of a worm that may be spreading over SMB. Which of the following signatures should be installed on the NIPS'?A . PERMIT from ANY: ANY to ANY: 445 regex '.-SMB . -'C . DROP from ANY:445 Co...