Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...

February 10, 2021 No Comments READ MORE +

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B

February 10, 2021 No Comments READ MORE +

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?

Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?A . An SLAB . AnNDAC . ABPAD . AnMOUView AnswerAnswer: D

February 10, 2021 No Comments READ MORE +

Which of the following sources would reveal if the CEO's personal information is for sale?

A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?A . Automated information sharingB . Open-source intelligenceC . The dark webD . Vulnerability databasesView AnswerAnswer: C

February 10, 2021 No Comments READ MORE +

Which of the following MDM configurations must be considered when the engineer travels for business?

An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?A . Screen locksB . Application managementC . GeofencingD . ContainerizationView AnswerAnswer: D

February 9, 2021 No Comments READ MORE +

Which of the following files should be given to the forensics firm?

A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?A . SecurityB . ApplicationC . DumpD . SyslogView...

February 9, 2021 No Comments READ MORE +

A symmetric encryption algorithm Is BEST suited for:

A symmetric encryption algorithm Is BEST suited for:A . key-exchange scalability.B . protecting large amounts of data.C . providing hashing capabilities,D . implementing non-repudiation.View AnswerAnswer: D

February 9, 2021 No Comments READ MORE +

cause of the CRO’s concerns?

The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed....

February 9, 2021 No Comments READ MORE +

Which of the following BEST describe this type of attack?

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all...

February 8, 2021 No Comments READ MORE +

Which of the following services would BEST meet the criteria?

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?A . TLSB . PFSC . ESPD . AHView AnswerAnswer: A

February 8, 2021 No Comments READ MORE +