Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).

Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).A . MantrapsB . Security guardsC . Video surveillanceD . FencesE . BollardsF . AntivirusView AnswerAnswer: A, B Explanation: A - a mantrap can trap those personnal with bad intension(preventive), and...

December 29, 2023 No Comments READ MORE +

Which of the following roles should the developer configure to meet these requirements?

A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles...

December 29, 2023 No Comments READ MORE +

Which of the following should the organization employ to meet this requirement?

An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?A . SOAPB . SAMLC . SSOD . KerberosView AnswerAnswer: C Explanation: Single Sign-On (SSO) is a mechanism that allows users to access multiple applications with a single set of login...

December 29, 2023 No Comments READ MORE +

Which of the following BEST describes what is happening?

During a Chief Information Security Officer (CISO) convention to discuss security awareness, the attendees are provided with a network connection to use as a resource. As the convention progresses, one of the attendees starts to notice delays in the connection, and the HIIPS site requests are reverting to HTTP. Which...

December 29, 2023 No Comments READ MORE +

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?A . PulverizingB . ShreddingC . IncineratingD . DegaussingView AnswerAnswer: B Explanation: Shredding may be the most secure and cost-effective way to destroy electronic data in any media that...

December 28, 2023 No Comments READ MORE +

Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?

Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?A . TestB . StagingC . DevelopmentD . ProductionView AnswerAnswer: A Explanation: The test environment is used to assess...

December 28, 2023 No Comments READ MORE +

Which of the following should the analyst enable on all the devices to meet these requirements?

A security analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows: * Ensure mobile devices can be tracked and wiped. * Confirm mobile devices are encrypted. Which of the following should the analyst enable on all the devices to meet these requirements?A . A GeofencingB...

December 28, 2023 No Comments READ MORE +

Which of the following is the administrator MOST likely trying to do?

When planning to build a virtual environment, an administrator need to achieve the following, • Establish polices in Limit who can create new VMs • Allocate resources according to actual utilization‘ • Require justification for requests outside of the standard requirements. • Create standardized categories based on size and resource...

December 28, 2023 No Comments READ MORE +

Which of the following is the security analyst MOST likely observing?

While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches. Which of the following is the security analyst MOST likely observing?A . SNMP trapsB . A Telnet sessionC . An SSH connectionD . SFTP trafficView AnswerAnswer: B...

December 28, 2023 No Comments READ MORE +

Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)

Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)A . Block cipherB . HashingC . Private keyD . Perfect forward secrecyE . SaltingF . Symmetric keysView AnswerAnswer: B, C Explanation: Non-repudiation is the ability to ensure that a party cannot deny a previous...

December 28, 2023 No Comments READ MORE +