Which of the following technologies BEST meets this need?

Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?A . GeofencingB . ContainerizationC . Device encryptionD . SandboxingView AnswerAnswer: B

November 20, 2020 No Comments READ MORE +

A critical enterprise component whose loss or destruction would significantly impede business operations or have an outsized impact on corporate revenue is known as:

A critical enterprise component whose loss or destruction would significantly impede business operations or have an outsized impact on corporate revenue is known as:A . a single point of failureB . critical system infrastructureC . proprietary information.D . a mission-essential functionView AnswerAnswer: D

November 20, 2020 No Comments READ MORE +

Which of the following security controls BEST mitigates social engineering attacks?

Which of the following security controls BEST mitigates social engineering attacks?A . Separation of dutiesB . Least privilegeC . User awareness trainingD . Mandatory vacationView AnswerAnswer: C

November 20, 2020 No Comments READ MORE +

Which of the following social engineering principles is Joe employing in this scenario'?

During a penetration test, Joe, an analyst, contacts the target's service desk Impersonating a user, he attempts to obtain assistance with resetting an email password. Joe claims this needs to be done as soon as possible, as he is the vice president of sales and does not want to contact...

November 20, 2020 No Comments READ MORE +

Which of the following should a company require prior to performing a penetration test?

Which of the following should a company require prior to performing a penetration test?A . NDAB . CVE scoreC . Data classificationD . List of threatsView AnswerAnswer: B

November 19, 2020 No Comments READ MORE +

Which of the following is the organization conducting?

During the penetration testing of an organization, the tester was provided with the names of a few key servers, along with their IP address. Which of the following is the organization conducting?A . Gray box testingB . White box testingC . Back box testingD . Isolated container testingE . Vulnerability...

November 18, 2020 No Comments READ MORE +

Which of the following would address this violation going forward?

An organization's Chief Executive Officer (CEO) directs a newly hired computer technician to install an OS on the CEO‘s: personal laptop. The technician performs the installation, and a software audit later in the month indicates a violation of the EULA occurred as a result. Which of the following would address...

November 18, 2020 No Comments READ MORE +

Which of the following is the BEST solution to be deployed?

After a breach, a company has decided to implement a solution to better understand the technique used by the attackers. Which of the following is the BEST solution to be deployed?A . Network analyzerB . Protocol analyzerC . Honeypot networkD . Configuration compliance scannerView AnswerAnswer: B

November 18, 2020 No Comments READ MORE +

Which of the following networking concepts would BEST accomplish this‘?

A network technician is setting up a new branch for a company. The users at the new branch will need to access resources securely as if they were at ‘the main location. Which of the following networking concepts would BEST accomplish this‘?A . Virtual network segmentationB . Physical network segmentationC...

November 18, 2020 No Comments READ MORE +

Which of the following tools has the team MOST likely deployed?

The director of information security at a company has recently directed the security engineering team to implement new security technologies aimed at reducing the impact of insider threats. Which of the following tools has the team MOST likely deployed? (Select TWO).A . DLFB . UTMC . SFTPD . SSHE ....

November 18, 2020 No Comments READ MORE +