Which of the following should be MOST concerning to the company?
A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?A . PrivacyB . Cloud storage of telemetry dataC . GPS spoofingD . Weather eventsView AnswerAnswer: A Explanation: The use of a drone for perimeter and boundary monitoring can...
Which of the following should the company Implement to prevent this type of attack from occurring in the future?
A company recently experienced an attack during which 5 main website was directed to the atack-er’s web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following should the company Implement to prevent this type of attack from occurring in the future?A . IPSecB . SSL/TLSC...
Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?
Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?A . PoCB . ProductionC . TestD . DevelopmentView AnswerAnswer: A...
MOST likely cause?
A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later, enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?A . Shadow ITB...
Which of the following BEST describes what is happening?
one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?A . Birthday collision on the certificate keyB . DNS hacking to reroute trafficC . Brute force to the access pointD ....
Which of the following cloud service provider types should business engage?
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should business engage?A . A laaSB . PaaSC . XaaSD . SaaSView AnswerAnswer: A Explanation: Infrastructure as a Service...
Which of the following would MOST likely be considered a benefit of this certification?
An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?A . It allows for the sharing of digital forensics data across organizationsB . It provides insurance in case of a data breachC . It provides complimentary training and...
Which of the following will the company MOST likely implement?
As part of a company's ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company MOST likely implement?A . TAXIIB . TLPC . TTPD . STIXView AnswerAnswer: A Explanation: Trusted Automated Exchange of...
Which of the following BEST describes the purpose of this device?
After a WiFi scan of a local office was conducted, an unknown wireless signal was identified Upon investigation, an unknown Raspberry Pi device was found connected to an Ethernet port using a single connection. Which of the following BEST describes the purpose of this device?A . loT sensorB . Evil...
Which of the following cryptographic techniques would BEST meet the requirement?
A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned...