Which of the following is MOST likely causing the malware alerts?

Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS. Which of...

March 7, 2021 1 Comment READ MORE +

Which of the following would BEST meet this need?

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D

March 7, 2021 No Comments READ MORE +

Which of the following ISO standards is certified for privacy?

Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C

March 7, 2021 No Comments READ MORE +

Which of the following control sets should a well-written BCP include? (Select THREE)

Which of the following control sets should a well-written BCP include? (Select THREE)A . PreventiveB . DetectiveC . DeterrentD . CorrectiveE . CompensatingF . PhysicalG . RecoveryView AnswerAnswer: A,D,G

March 6, 2021 No Comments READ MORE +

Which of the following would BEST help the team ensure the application is ready to be released to production?

The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?A . Limit the...

March 6, 2021 No Comments READ MORE +

Which of the following would MOST likely allow the company to find the cause?

A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet. Which of the following would MOST likely allow the company to find the cause?A . ChecksumsB . WatermarksC . Oder of volatilityD . A log analysisE...

March 6, 2021 No Comments READ MORE +

Which of the following would BEST assist the company?

A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B

March 6, 2021 1 Comment READ MORE +

Which of the following MFA factors or attributes are being utilized in the authentication process?

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).A . Something you knowB . Something you haveC . Somewhere you areD ....

March 6, 2021 No Comments READ MORE +

Which of the following did the assessment identify?

A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?A . Unsecme protocolsB . Default settingsC . Open permissionsD . Weak encryptionView AnswerAnswer: D

March 6, 2021 No Comments READ MORE +

Which of the following environments minimizes end-user disruption and is MOST likely to be used to assess the impacts of any database migrations or major system changes by using the final version of the code?

Which of the following environments minimizes end-user disruption and is MOST likely to be used to assess the impacts of any database migrations or major system changes by using the final version of the code?A . StagingB . TestC . ProductionD . DevelopmentView AnswerAnswer: B

March 6, 2021 No Comments READ MORE +