Which of the following concepts does this BEST represent?
Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. Which of the following concepts does this BEST represent?A . Functional testingB . Stored proceduresC . ElasticityD . Continuous integrationView AnswerAnswer: D Explanation: Continuous integration is a software development practice where...
Which of the following BEST describes the purpose of this device?
After a WiFi scan of a local office was conducted, an unknown wireless signal was identified Upon investigation, an unknown Raspberry Pi device was found connected to an Ethernet port using a single connection. Which of the following BEST describes the purpose of this device?A . loT sensorB . Evil...
Which of the following was the MOST likely cause?
A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later, enterprise data was found to have been compromised from a local database. Which of the following was the MOST likely cause?A . Shadow ITB...
Which of the following BEST explains a risk of this practice?
A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?A . Default system configurationB . Unsecure protocolsC . Lack of vendor supportD . Weak encryptionView AnswerAnswer: C Explanation: One of the risks of using legacy...
Which of the following should the manager use to control the network traffic?
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?A . A DMZB . A VPN aC . A VLAND . An ACLView AnswerAnswer: D Explanation: After segmenting the network, a network...
Which of the following BEST explains a risk of this practice?
A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?A . Default system configurationB . Unsecure protocolsC . Lack of vendor supportD . Weak encryptionView AnswerAnswer: C Explanation: Using legacy software to support a critical...
Which of the following is the security analyst MOST likely observing?
While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches. Which of the following is the security analyst MOST likely observing?A . SNMP trapsB . A Telnet sessionC . An SSH connectionD . SFTP trafficView AnswerAnswer: B...
Which of the following actions MOST likely supports an investigation for fraudulent submission?
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email...
Which of the following is MOST capable of accomplishing both tasks?
The security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted files. The analyst has been tasked with determining the infringing source machine and instructed to...
Which of the following controls would be BEST to use to prevent such a breach in the future?
The following are the logs of a successful attack. Which of the following controls would be BEST to use to prevent such a breach in the future?A . Password historyB . Account expirationC . Password complexityD . Account lockoutView AnswerAnswer: C Explanation: To prevent such a breach in the future,...