Which of the following types of controls does this BEST describe?

A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A . DeterrentB . PreventiveC . DetectiveD . CompensatingView AnswerAnswer: A

May 20, 2021 No Comments READ MORE +

Which of the following is the BEST way to do this?

As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?A . Use a vulnerability scanner.B . Use a configuration compliance scanner.C . Use a...

May 20, 2021 No Comments READ MORE +

Which of the following cryptographic attacks would salting of passwords render ineffective?

Which of the following cryptographic attacks would salting of passwords render ineffective?A . Brute forceB . DictionaryC . Rainbow tablesD . BirthdayView AnswerAnswer: C

May 20, 2021 No Comments READ MORE +

Which of the following describes what occurred?

A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the...

May 19, 2021 No Comments READ MORE +

Which of the following should be used to sign the user’s certificates?

Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user’s certificates?A . RAB . CAC . CRLD . CSRView AnswerAnswer: B

May 19, 2021 No Comments READ MORE +

Which of the following types of malware is MOST likely causing this issue?

A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?A . BotnetB . RansomwareC . Polymorphic malwareD . Armored virusView AnswerAnswer: A

May 19, 2021 No Comments READ MORE +

Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these requirements?

A security analyst is hardening a web server, which should allow a secure certificate-based session using the organization’s PKI infrastructure. The web server should also utilize the latest security techniques and standards. Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these...

May 19, 2021 No Comments READ MORE +

Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?

Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?A . Error handling to protect against program exploitationB . Exception handling to protect against XSRF attacks.C . Input validation to protect against SQL injection.D . Padding to protect against string buffer...

May 19, 2021 No Comments READ MORE +

Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?

Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?A . CompetitorB . HacktivistC . InsiderD . Organized crime.View AnswerAnswer: A

May 19, 2021 No Comments READ MORE +

Which of the following BEST describes this phase of the incident response process?

Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions: - Shut down all network shares. - Run an email search identifying all employees who...

May 19, 2021 No Comments READ MORE +