Which of the following technologies would BEST be suited to accomplish this?

A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion. Which of the following technologies would BEST be suited to accomplish this?A . Transport EncryptionB . Stream EncryptionC . Digital SignatureD . SteganographyView AnswerAnswer: D Explanation: Steganography is the...

July 16, 2018 No Comments READ MORE +

Which of the following is being described?

An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware the attacker is provided with access to the infected machine. Which of the following is being described?A . Zero-day exploitB . Remote code executionC ....

July 12, 2018 No Comments READ MORE +

This is an example of which of the following attacks?

A web application is configured to target browsers and allow access to bank accounts to siphon money to a foreign account. This is an example of which of the following attacks?A . SQL injectionB . Header manipulationC . Cross-site scriptingD . Flash cookie exploitationView AnswerAnswer: C

July 2, 2018 No Comments READ MORE +

Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?

Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?A . ShibbolethB . RADIUS federationC . SAMLD ....

July 1, 2018 No Comments READ MORE +

Which of the following should the security administrator do to rectify this issue?

A security engineer is faced with competing requirements from the networking group and database administrators. The database administrators would like ten application servers on the same subnet for ease of administration, whereas the networking group would like to segment all applications from one another. Which of the following should the...

June 30, 2018 No Comments READ MORE +

Which of the following is the MOST likely cause of the connectivity issues?

) The wireless icon shows connectivity but has no network access The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate. Which of the following is the MOST likely cause of the connectivity issues?A . The wireless signal is not strong...

June 22, 2018 No Comments READ MORE +

Which of the following would BEST accomplish these goals?

A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing...

June 19, 2018 No Comments READ MORE +

To which of the following categories does the refrigerator belong?

A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong?A...

June 17, 2018 No Comments READ MORE +

Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?

Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?A . War chalkingB . BluejackingC . BluesnarfingD . Rogue tetheringView AnswerAnswer: B Explanation: Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs...

June 13, 2018 No Comments READ MORE +

Which of the following subnets would BEST meet the requirements?

A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST meet the requirements?A . 192.168.0.16 255.25.255.248B . 192.168.0.16/28C . 192.168.1.50 255.255.25.240D . 192.168.2.32/27View AnswerAnswer:...

June 12, 2018 No Comments READ MORE +