Which of the following recommendations should the administrator include in the assessment?
A security administrator is creating a risk assessment on BYOD. One of the requirements of the risk assessment is to address the following • Centrally managing mobile devices • Data loss prevention Which of the following recommendations should the administrator include in the assessment? (Select TWO).A . implement encryption.B ....
Which of the following should the security administrator implement?
The Chief Information Security Officer (CISO) at a large company tasks a security administrator to provide additional validation for website customers. Which of the following should the security administrator implement?A . HTTPB . DNSSECC . 802.1XD . Captive portalView AnswerAnswer: D
Which of the following concepts of cryptography is shown?
Given the following: > md5.exe filel.txt > ADIFAB103773DC6A1E6021B7E503A210 > md5.exe file2.txt > ADIFAB103773DC6A1E602lB7E503A210 Which of the following concepts of cryptography is shown?A . CollisionB . SaltingC . SteganographyD . Stream cipherView AnswerAnswer: B
Which of the following would be the SAFEST next step to address the issue?
After deploying an antivirus solution on some network-isolated industrial computers, the service desk team received a trouble ticket about the following message being displayed on then computer’s screen: Which of the following would be the SAFEST next step to address the issue?A . Immediately delete the detected file from the...
Which of the following actions should be taken before deploying the new server?
A security team has completed the installation of a new server. The OS and applications have been patched and tested, and the server is ready to be deployed. Which of the following actions should be taken before deploying the new server?A . Disable the default accounts.B . Run a penetration...
Which of the following IP addresses in MOST likely involved in the data leakage attempt?
An analyst is reviewing the following web-server log after receiving an alert from the DLP system about multiple PII records being transmitted in cleartext: Which of the following IP addresses in MOST likely involved in the data leakage attempt?A . 10.43.40.112B . 10.45.10.200C . 172.44.33.10D . 192.4.43.122View AnswerAnswer: C
Which of the following is the BEST method to use?
A security analyst wants to limit the use of USB and external drives to protect against malware. as well as protect files leaving a user’s computer. Which of the following is the BEST method to use?A . FirewallB . RouterC . Antivirus softwareD . Data loss preventionView AnswerAnswer: D
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?A . Memory leakB . SQL injectionC . Resource exhaustionD . Buffer overflowView AnswerAnswer: D
Which of the following security issues has been discovered based on the output?
An analyst is currently looking at the following output: Which of the following security issues has been discovered based on the output?A . Insider threatB . License compliance violationC . Unauthorized softwareD . Misconfigured admin permissionsView AnswerAnswer: B
In which of the following ways did the competitor apply media sanitation?
A dumpster diver was able 10 retrieve hard drives from a competitor's trash bin. After installing the and hard drives and running common date recovery software. Sensitive information was recovered. In which of the following ways did the competitor apply media sanitation?A . PulverizingB . DegaussingC . EncryptingD . FormattingView...