Which of the following BEST describes this type of email?

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize. Which of the following BEST describes this type of email?A ....

March 6, 2021 No Comments READ MORE +

Which of the following would BEST meet these requirements?

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...

March 6, 2021 No Comments READ MORE +

Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...

March 5, 2021 No Comments READ MORE +

Which of the following is the WEAKEST design element?

An organization routes all of its traffic through a VPN Most users are remote and connect into a corporate datacenter that houses confidential information There is a firewall at the Internet border followed by a DIP appliance, the VPN server and the datacenter itself. Which of the following is the...

March 5, 2021 No Comments READ MORE +

Which of the following must be part of the security architecture to achieve AAA?

A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Select TWO)A . DNSSECB . Reverse proxyC . VPN concentratorD . PKIE . Active DirectoryF . RADIUSView AnswerAnswer: E,F

March 5, 2021 No Comments READ MORE +

Which of the following are the BEST options to accomplish this objective'?

An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sale systems The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the BEST options to accomplish this objective'? (Select...

March 5, 2021 No Comments READ MORE +

Which of the following technologies are being utilized to provide these capabilities?

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies...

March 5, 2021 No Comments READ MORE +

Which of the following BEST explains the appliance’s vulnerable state?

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?A . The system was configured with weak default security settings.B . The device uses weak encryption ciphers.C ....

March 5, 2021 No Comments READ MORE +

Which of the following scan Types would produce the BEST vulnerability scan report?

A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan Types would produce the BEST vulnerability scan report?A . PortB . IntrusiveC . Host discoveryD . CredentialedView AnswerAnswer: D

March 4, 2021 No Comments READ MORE +

Which of the following would mitigate the damage done by this type of data exfiltration in the future?

A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?A . Create DLP controls that prevent...

March 4, 2021 1 Comment READ MORE +