Which of the following network appliances can achieve this goal?

An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?A . HSMB . CASBC . TPMD . DLPView AnswerAnswer: A Explanation: Hardware Security Module (HSM) is a network appliance designed to securely store cryptographic keys and perform cryptographic operations....

September 27, 2024 No Comments READ MORE +

Which of the following should the analyst recommend to disable?

An analyst Is generating a security report for the management team. Security guidelines recommend disabling all listening unencrypted services. Given this output from Nmap: Which of the following should the analyst recommend to disable?A . 21/tcpB . 22/tcpC . 23/tcpD . 443/tcpView AnswerAnswer: A

September 26, 2024 No Comments READ MORE +

Which of the following is MOST likely the cause?

A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?A . A new firewall rule is needed to access the application.B . The...

September 26, 2024 No Comments READ MORE +

Which of the following is the BEST course of action for the analyst to take?

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the BEST course of action for the analyst to take?A . Apply a DLP solution.B...

September 26, 2024 No Comments READ MORE +

Which of the following is the BEST security solution to reduce this risk?

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?A . CASBB . VPN concentratorC . MFAD . VPC...

September 26, 2024 No Comments READ MORE +

Which of the following MOST likely would have prevented the attacker from learning the service account name?

A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation: Which of the following MOST likely would have prevented the attacker from learning the service account name?A . Race condition testingB ....

September 26, 2024 No Comments READ MORE +

Which of the following cloud service provider types should business engage?

A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking. Which of the following cloud service provider types should business engage?A . A laaSB . PaaSC . XaaSD . SaaSView AnswerAnswer: A Explanation: Infrastructure as a Service...

September 25, 2024 No Comments READ MORE +

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?A . Unsecured root accountsB . Zero dayC . Shared tenancyD . Insider threatView AnswerAnswer: C Explanation: When hosting applications in the public cloud, there is a risk of shared tenancy, meaning that multiple...

September 25, 2024 No Comments READ MORE +

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrixB . Risk toleranceC . Risk registerD . Risk appetiteView AnswerAnswer: B Explanation: To determine the total risk an organization can...

September 25, 2024 No Comments READ MORE +

Which of the following constraints BEST describes the reason the findings cannot be remediated?

A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business. Which of the following constraints BEST describes the reason the findings cannot be remediated?A . inability to authenticateB . Implied...

September 25, 2024 No Comments READ MORE +