Which of the following should the administrator choose?

An administrator is setting up automated remote file transfers to another organization. The other organization has the following requirements for the connection protocol: • Encryption in transit is required. • Mutual authentication must be used. • Certificate authentication must be used (no passwords). Which of the following should the administrator...

November 22, 2020 No Comments READ MORE +

Which of the following should be reviewed to mitigate this problem?

A security analyst has recently deployed an MDM solution that requires biometric authentication for company-issued smartphones. As the solution was implemented the help desk has seen a dramatic increase in calls by employees frustrated that company-issued phones take several attempts to unlock using the fingerprint scanner. Which of the following...

November 22, 2020 No Comments READ MORE +

Based on the above output, which of the following is the malicious file?

A technician suspects that a desktop was compromised with a rootkit. After removing the hard drive from the desktop and running an offline file integrity check, the technician reviews the following output: Based on the above output, which of the following is the malicious file?A . notepad.exeB . lsass.exeC ....

November 21, 2020 No Comments READ MORE +

Which of the following is the BEST solution for the law office?

A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquarters. The telecommunication company has decided to discontinue its dark fiber product and is offering an MPLS connection. Which the law office feels is too expensive. Which of the following...

November 21, 2020 No Comments READ MORE +

Which of the following BEST describes this type of penetration test?

An authorized user is conducting a penetration scan of a system for an organization. The tester has a set of network diagrams. Source code, version numbers of applications. and other information about the system. Including hostnames and network addresses. Which of the following BEST describes this type of penetration test?A...

November 21, 2020 No Comments READ MORE +

Which of the following is the BEST example of this?

A security engineer wants to further secure a sensitive VLAN on the network by introducing MFA. Which of the following is the BEST example of this? A. PSK and PIN B. RSA token and password C. Fingerprint scanner and voice recognition D. Secret question and CAPTCHAView AnswerAnswer: C

November 21, 2020 No Comments READ MORE +

Which of the following strategies is the security engineer executing?

A security engineer implements multiple technical measures to secure an enterprise network. The engineer also works with the Chief information Officer (CID) to implement policies to govern user behavior. Which of the following strategies is the security engineer executing?A . Base liningB . Mandatory access controlC . Control diversityD ....

November 21, 2020 No Comments READ MORE +

Which of the following physical security controls is MOST effective when trying to prevent tailgating?

Which of the following physical security controls is MOST effective when trying to prevent tailgating?A . CCTVB . MantrapC . BiometricsD . RFID badgeE . Motion detectionView AnswerAnswer: B

November 21, 2020 No Comments READ MORE +

Which of the following actions should the security analyst take?

A security analyst investigate a report from an employee in the human resources (HR) department who is issues with Internal access. When the security analyst pull the UTM logs for the IP addresses in the HR group, the following activity is shown: Which of the following actions should the security...

November 21, 2020 No Comments READ MORE +

Which of the following can be used to ensure the security of the document while in transit and at rest?

A user wants to send a confidential message to a customer to ensure unauthorized users cannot access the information. Which of the following can be used to ensure the security of the document while in transit and at rest?A . BCRYPTB . PGPC . FTPSD . S/MIMEView AnswerAnswer: B

November 20, 2020 No Comments READ MORE +