Which of the following types of controls does this BEST describe?
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?A . DeterrentB . PreventiveC . DetectiveD . CompensatingView AnswerAnswer: A
Which of the following is the BEST way to do this?
As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technical must ensure the OS settings are hardened. Which of the following is the BEST way to do this?A . Use a vulnerability scanner.B . Use a configuration compliance scanner.C . Use a...
Which of the following cryptographic attacks would salting of passwords render ineffective?
Which of the following cryptographic attacks would salting of passwords render ineffective?A . Brute forceB . DictionaryC . Rainbow tablesD . BirthdayView AnswerAnswer: C
Which of the following describes what occurred?
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the...
Which of the following should be used to sign the user’s certificates?
Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user’s certificates?A . RAB . CAC . CRLD . CSRView AnswerAnswer: B
Which of the following types of malware is MOST likely causing this issue?
A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?A . BotnetB . RansomwareC . Polymorphic malwareD . Armored virusView AnswerAnswer: A
Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these requirements?
A security analyst is hardening a web server, which should allow a secure certificate-based session using the organization’s PKI infrastructure. The web server should also utilize the latest security techniques and standards. Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these...
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?A . Error handling to protect against program exploitationB . Exception handling to protect against XSRF attacks.C . Input validation to protect against SQL injection.D . Padding to protect against string buffer...
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?A . CompetitorB . HacktivistC . InsiderD . Organized crime.View AnswerAnswer: A
Which of the following BEST describes this phase of the incident response process?
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network and security teams perform the following actions: - Shut down all network shares. - Run an email search identifying all employees who...