Which of the following documents did Ann receive?

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations. Which of the following documents did Ann receive?A . An annual privacy noticeB . A non-disclosure agreementC . A privileged-user agreementD . A memorandum...

October 7, 2024 No Comments READ MORE +

Which of the following resiliency techniques was applied to the network to prevent this attack?

A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted. Which of the following resiliency techniques was applied to the network to prevent this attack?A . NIC TeamingB . Port mirroringC...

October 7, 2024 No Comments READ MORE +

Which of the following roles should the developer configure to meet these requirements?

A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles...

October 7, 2024 No Comments READ MORE +

Which of the following cryptographic techniques would BEST meet the requirement?

A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned...

October 7, 2024 No Comments READ MORE +

Which of the following should the organization employ to meet this requirement?

An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?A . SOAPB . SAMLC . SSOD . KerberosView AnswerAnswer: C Explanation: Single Sign-On (SSO) is a mechanism that allows users to access multiple applications with a single set of login...

October 6, 2024 No Comments READ MORE +

Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).

Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).A . Page filesB . Event logsC . RAMD . CacheE . Stored filesF . HDDView AnswerAnswer: C, D Explanation: In a forensic investigation, volatile data should be collected first, based on...

October 6, 2024 No Comments READ MORE +

Which of the following would be the BEST control for the company to require from prospective vendors?

A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?A ....

October 5, 2024 No Comments READ MORE +

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?A . RTOB . MTBFC . MTTRD . RPOView AnswerAnswer: C Explanation: Mean Time To Repair (MTTR) is a maintenance metric that measures the average time required to troubleshoot and restore...

October 5, 2024 No Comments READ MORE +

Which of the following BEST explains this type of attack?

A security analyst was deploying a new website and found a connection attempting to authenticate on the site's portal. While Investigating. The incident, the analyst identified the following Input in the username field: Which of the following BEST explains this type of attack?A . DLL injection to hijack administrator servicesB...

October 4, 2024 No Comments READ MORE +

Which of the following is MOST likely the issue?

A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when writing documents and the mouse pointer occasional disappears. The task list shows the following results Which of the following is MOST likely the issue?A . RATB . PUPC . SpywareD . KeyloggerView AnswerAnswer: C Explanation:...

October 4, 2024 No Comments READ MORE +