Which of the following settings would prevent users from being able to immediately reuse the same passwords?
A network administrator was concerned during an audit that users were able to use the same passwords the day after a password change policy took effect. The following settings are in place: - Users must change their passwords every 30 days. - Users cannot reuse the last 10 passwords. Which...
When implementing automation with IoT devices, which of the following should be considered FIRST to keep the network secure?
When implementing automation with IoT devices, which of the following should be considered FIRST to keep the network secure?A . Z-Wave compatibilityB . Network rangeC . Zigbee configurationD . Communication protocolsView AnswerAnswer: D
Which of the following tools will the administrator MOST likely use to confirm the suspicions?
A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?A . NmapB . WiresharkC . AutopsyD . DNSEnumView AnswerAnswer: A
Which of the following attacks is used to capture the WPA2 handshake?
Which of the following attacks is used to capture the WPA2 handshake?A . ReplayB . IVC . Evil twinD . DisassociationView AnswerAnswer: D
Which of the following should the user do NEXT to protect the data on the device?
A user loses a COPE device. Which of the following should the user do NEXT to protect the data on the device?A . Call the company help desk to remotely wipe the device.B . Report the loss to authorities.C . Check with corporate physical security for the device.D . Identify...
<a href="https://www.company.com/payto.do?
A forensics investigator is examining a number of unauthorized payments that were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the...
Which of the following should the IT administrator do FIRST after recovery?
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST...
Which of the following is the BEST use of a WAF?
Which of the following is the BEST use of a WAF?A . To protect sites on web servers that are publicly accessibleB . To allow access to web services of internal users of the organizationC . To maintain connection status of all HTTP requestsD . To deny access to all...
Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and server. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....
In which of the following risk management strategies would cybersecurity insurance be used?
In which of the following risk management strategies would cybersecurity insurance be used?A . TransferenceB . AvoidanceC . AcceptanceD . MitigationView AnswerAnswer: A