Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?A . An SLAB . AnNDAC . ABPAD . AnMOUView AnswerAnswer: D

March 14, 2021 No Comments READ MORE +

Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

In which of the following common use cases would steganography be employed?

In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A

March 14, 2021 No Comments READ MORE +

Which of the following is MOST likely the cause of the reported issue?

A user recently attended an exposition and received some digital promotional materials The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open. Which of the following is MOST likely the cause of the reported issue?A...

March 14, 2021 No Comments READ MORE +

Which of the following is the attacker MOST likely attempting?

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker MOST likely attempting?A . A spear-phishing attackB . A watering-hole attackC . Typo squattingD . A phishing attackView AnswerAnswer: B

March 14, 2021 No Comments READ MORE +

Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based firewallC...

March 14, 2021 No Comments READ MORE +

Which of the following RAID levels meets this requirements?

A critical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity and handle two simultaneous disk failures. Which of the following RAID levels meets this requirements?A . RAID 0+1B . RAID 2C . RAID 5D . RAID...

March 13, 2021 No Comments READ MORE +

Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).

Which of the following organizational policies are MOST likely to detect fraud that is being conducted by existing employees? (Select TWO).A . OffboardingB . Mandatory vacationC . Job rotationD . Background checksE . Separation of dutiesF . Acceptable useView AnswerAnswer: B,C

March 13, 2021 No Comments READ MORE +

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...

March 13, 2021 No Comments READ MORE +

Which of the following would be the BEST method to increase the security on the Linux server?

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?A . Randomize the shared credentialsB . Use only guest accounts...

March 13, 2021 No Comments READ MORE +