Which of the following methods would BEST prevent the exfiltration of data?

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Select TWO).A . VPNB . Drive encryptionC . Network firewallD . File level encryptionE . USB blockerF . MFAView...

January 28, 2021 No Comments READ MORE +

Which of the following would BEST meet this need?

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?A . CVEB . SIEMC . SOARD . CVSSView AnswerAnswer: D

January 28, 2021 No Comments READ MORE +

Which of the following is the purpose of a risk register?

Which of the following is the purpose of a risk register?A . To define the level or risk using probability and likelihoodB . To register the risk with the required regulatory agenciesC . To identify the risk, the risk owner, and the risk measuresD . To formally log the type...

December 28, 2020 1 Comment READ MORE +

Which of the following would MOST likely help mitigate this issue?

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?A . DNSSEC and DMARCB . DNS query loggingC . Exact mail exchanger records in the DNSD . The addition of DNS conditional forwardersView AnswerAnswer: C

December 28, 2020 No Comments READ MORE +

Which of the following would MOST likely support the integrity of a voting machine?

Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: D

December 27, 2020 No Comments READ MORE +

Which of the following would BEST meet this objective?

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)A . Dual power supplyB . Off-site backupsC . Automatic OS upgradesD . NIC teamingE . Scheduled penetration testingF . Network-attached storageView AnswerAnswer:...

December 26, 2020 No Comments READ MORE +

Which of the following access control schemes would be BEST for the company to implement?

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D

December 24, 2020 No Comments READ MORE +

Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?A . PCI...

December 23, 2020 No Comments READ MORE +

Which of the following describes what the manager is doing?

A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the...

December 23, 2020 No Comments READ MORE +

Which of the following would BEST prevent this attack from reoccurring?

A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?A . Configure the perimeter firewall to deny inbound external connections to SMB...

December 22, 2020 No Comments READ MORE +