Which of the following targeted the organization?

An organization just experienced a major cyberattack modem. The attack was well coordinated sophisticated and highly skilled. Which of the following targeted the organization?A . Shadow ITB . An insider threatC . A hacktivistD . An advanced persistent threatView AnswerAnswer: D

February 8, 2021 No Comments READ MORE +

Which of the following would meet the organization’s needs for a third factor?

An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPMView AnswerAnswer: B

February 8, 2021 No Comments READ MORE +

Which of the following would MOST likely contain that information?

An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer: C

February 7, 2021 No Comments READ MORE +

Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

February 7, 2021 No Comments READ MORE +

Which of the following would BEST meet these requirements?

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements?...

February 7, 2021 No Comments READ MORE +

Which of the following is happening to this switch?

A security administrator checks the table of a network switch, which shows the following output: Which of the following is happening to this switch?A . MAC FloodingB . DNS poisoningC . MAC cloningD . ARP poisoningView AnswerAnswer: A

February 7, 2021 No Comments READ MORE +

Which of the following MOST likely the cause of the cause of the access issues?

A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?A . False rejectionB . Cross-over error rateC...

February 7, 2021 No Comments READ MORE +

Which of the following would be BEST for the security manager to use in a threat mode?

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company’s Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks. Which of the following would be BEST for the security manager to use...

February 7, 2021 No Comments READ MORE +

Which of the following is the MOST likely cause of the issue?

An end user reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user's email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user's computer...

February 6, 2021 No Comments READ MORE +

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?A . TokenizationB . Data maskingC . NormalizationD . ObfuscationView AnswerAnswer: C

February 6, 2021 No Comments READ MORE +