Which of the following should be implemented to provide the MOST secure environment?

A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?A . A perimeter firewall and IDSB . An air gapped compiler networkC . A honeypot residing in a DMZD...

December 11, 2018 No Comments READ MORE +

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select TWO).

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select TWO).A . Rainbow table attacks greatly reduce compute cycles at attack time.B . Rainbow tables must include precompiled hashes.C . Rainbow table attacks do not require access to hashed passwords.D . Rainbow table attacks...

December 11, 2018 No Comments READ MORE +

Which of the following is the BEST way to accomplish this?

A network administrator wants to ensure that users do not connect any unauthorized devices to the company network. Each desk needs to connect a VoIP phone and computer. Which of the following is the BEST way to accomplish this?A . Enforce authentication for network devicesB . Configure the phones on...

December 5, 2018 No Comments READ MORE +

Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market?

Which of the following threat actors is MOST likely to steal a company's proprietary information to gain a market edge and reduce time to market?A . CompetitorB . HacktivistC . InsiderD . Organized crimeView AnswerAnswer: A

December 3, 2018 No Comments READ MORE +

Which of the following actions are MOST appropriate to harden applications against infiltration by former employees?

After a merger between two companies a security analyst has been asked to ensure that the organization's systems are secured against infiltration by any former employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)A...

November 20, 2018 No Comments READ MORE +

Which of the following should be implemented in order to meet the security policy requirements?

A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These...

November 13, 2018 No Comments READ MORE +

Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?

Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?A . Roll back changes in the test environmentB . Verify the hashes of filesC . Archive and compress the filesD . Update the secure baselineView AnswerAnswer: B

November 9, 2018 No Comments READ MORE +

Which of the following should the security analyst do to determine if the compromised system still has an active connection?

A Security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.6666. Which of the following should the security analyst do to determine if the compromised system still has an active connection?A . tracertB...

November 9, 2018 No Comments READ MORE +

Which of the following use the SSH protocol?

Which of the following use the SSH protocol?A . StelnetB . SCPC . SNMPD . FTPSE . SSLF . SFTPView AnswerAnswer: BF

November 8, 2018 No Comments READ MORE +

Which of the following is the LEAST secure hashing algorithm?

Which of the following is the LEAST secure hashing algorithm?A . SHA1B . RIPEMDC . MD5D . DESView AnswerAnswer: C

November 5, 2018 No Comments READ MORE +