Which of the following will the company MOST likely review to trace this transaction?
After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?A . The public ledgerB . The NetFlow dataC . A checksumD . The event logView AnswerAnswer: A
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?A . An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.B . An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying...
Which of the following would be the BEST resource for determining the order of priority?
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?A . NmapnB . Heat...
Which of the following BEST describes the tasks the developer is conducting?
A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A
but nothing else?
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?A . SaaSB . PaaSC . IaaSD . DaaSView AnswerAnswer: C
Which of the following tactics would an attacker MOST likely use in this scenario?
Company engineers regularly participate in a public Internet forum with other engineers throughout the industry. Which of the following tactics would an attacker MOST likely use in this scenario?A . Watering-hole attackB . Credential harvestingC . Hybrid warfareD . PharmingView AnswerAnswer: A
Which of the following relets to applications and systems that are used within an organization without consent or approval?
Which of the following relets to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A
Which of the following attacks has occurred?
A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, While reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...
In which of the following risk management strategies would cybersecurity insurance be used?
In which of the following risk management strategies would cybersecurity insurance be used?A . TransferenceB . AvoidanceC . AcceptanceD . MitigationView AnswerAnswer: A
Which of the following should the engineer employ to meet these requirements?
A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....