Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...

September 7, 2020 No Comments READ MORE +

Which of the following controls, when required together, will address the protection of data-at- rest as well as strong authentication?

An organization is developing its mobile device management policies and procedures and is concerned about vulnerabilities that are associated with sensitive data being saved to a mobile device, as well as weak authentication when using a PIN. As part of some discussions on the topic, several solutions are proposed. Which...

September 6, 2020 No Comments READ MORE +

Which of the following should the administrator recommend?

A network administrator at a large organization is reviewing methods to improve the security of the wired LAN. Any security improvement must be centrally managed and allow corporate-owned devices to have access to the intranet but limit others to Internet access only. Which of the following should the administrator recommend?A...

September 6, 2020 No Comments READ MORE +

Which of the following BEST describes these attackers?

After successfully breaking into several networks and infecting multiple machines with malware, hackers contact the network owners, demanding payment to remove the infection and decrypt files. The hackers threaten to publicly release information about the breach if they are not paid. Which of the following BEST describes these attackers?A ....

September 6, 2020 No Comments READ MORE +

Which of the following must be configured to provide authentication between the switch and the TACACS + server?

Which of the following must be configured to provide authentication between the switch and the TACACS + server? A systems administrator is configuring a new network switch for TACACS + management and authentication. Which of the following must be configured to provide authentication between the switch and the TACACS +...

July 8, 2020 No Comments READ MORE +

Which of the following would BEST accomplish these goals?

A security analyst is doing a vulnerability assessment on a database server. A scanning tool returns the following information: There have been several security breaches on the webserver that accesses this database. The security team is instructed to mitigate the impact of any possible breaches. The security team is also...

July 8, 2020 No Comments READ MORE +

Which of the following impacts are associated with vulnerabilities in embedded systems? (Select TWO)

Which of the following impacts are associated with vulnerabilities in embedded systems? (Select TWO)A . Repeated exploitation due to un patch able firmwareB . Denial of service due to an integrated legacy operating systemC . Loss of inventory accountability due to device deploymentD . Key reuse and collision issues due...

July 8, 2020 No Comments READ MORE +

Which of the following should the technician use to validate this assumption?

A technician, who is managing a secure B2B connection, noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to question certain PKI components. Which of the following should the technician use to validate this assumption? (Choose two.)A . PEMB ....

July 8, 2020 No Comments READ MORE +

Which of the following tools should the security administrator use to test whether the account lockout policy is working correctly?

An organization recently implemented an account lockout policy on its portal. The portal was configured to display a banner instructing locked out users to contact the helpdesk. Which of the following tools should the security administrator use to test whether the account lockout policy is working correctly?A . An online...

July 7, 2020 No Comments READ MORE +

Which of the following would be the BEST solution for the CIO to implement?

A Chief Information Officer (CIO) is concerned that encryption keys might be ex filtrate d by a contractor. The CIO wants to keep control over key visibility and management. Which of the following would be the BEST solution for the CIO to implement?A . HSMB . CAC . SSHD ....

July 3, 2020 No Comments READ MORE +