Which of the following should a security engineer do to prevent such an attack in the future?
A company recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive data. Which of the following should a security engineer do to prevent such an attack in the future?A . Use password hashing.B . Enforce...
Which of the following would meet the organization’s needs for a third factor?
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B
Which of the following should the administrator implement to find and remediate the Issue?
During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to...
Which of the following intelligence sources should to security analyst review?
A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute. Which of the following intelligence sources should to security analyst review?A . Vulnerability feedsB . Trusted automated exchange of indicator informationC . Structured threat information expressionD . Industry information-sharing and...
Which of the following would MOST likely have prevented this breach?
A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?A . A firewallB . A device pinC . A USB data blockerD . BiometricsView...
Which of the following would BEST meet this objective?
A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)A . Dual power supplyB . Off-site backupsC . Automatic OS upgradesD . NIC teamingE . Scheduled penetration testingF . Network-attached storageView AnswerAnswer:...
Which of the following would MOST likely support the integrity of a voting machine?
Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: D
Which of the following certificate types would BEST meet the requirements?
A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are: ✑ www.company.com (main website) ✑ contactus.company.com (for locating a nearby location) ✑ quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing...
Which of the following would work BEST to help identify potential vulnerabilities?
An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?A . Hping3 Cs comptia, org Cp 80B . Nc -1 Cv comptia, org Cp 80C . nmp comptia, org...
Which of the following recommendations would BEST address the CSO’s concern?
A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would BEST address the CSO’s concern?A . Deploy an MDM solution.B . Implement managed FDD...