Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?
Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?A . The key length of the encryption algorithmB . The encryption algorithm's longevityC . A method of introducing entropy into key calculationsD . The...
Which of the following is needed to meet the objective?
A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?A . A reverse proxyB . A decryption certificateC . A spill-tunnel VPND . Load-balanced serversView AnswerAnswer: B Explanation: A Web Application Firewall...
Which of the following is the primary use case for this scenario?
A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?A . Implementation of preventive controlsB . Implementation of detective controlsC . Implementation of deterrent...
Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk...
Which of the following should the engineer implement?
A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?A . An air gapB . A hot siteC . A VUAND . A screened subnetView AnswerAnswer: D Explanation: A screened subnet...
Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?
Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?A . ISO 27701B . The Center for Internet SecurityC . SSAE SOC 2D . NIST Risk Management...
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host: Based on the IoCS, which of the following was the MOST likely attack used to compromise...
Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?
A company would like to provide flexibility for employees on device preference. However, the company is concerned about supporting too many different types of hardware. Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?A ....
Which of the following configuration should an analysis enable to improve security?
A company has discovered unauthorized devices are using its WIFI network, and it wants to harden the access point to improve security. Which of the following configuration should an analysis enable to improve security? (Select TWO.) A. RADIUS B. PEAP C. WPS D. WEP-EKIP E. SSL F. WPA2-PSKView AnswerAnswer: A,...
Which of the following should the organization implement?
An organization wants to integrate its incident response processes into a workflow with automated decision points and actions based on predefined playbooks. Which of the following should the organization implement?A . SIEMB . SOARC . EDRD . CASBView AnswerAnswer: B Explanation: Security Orchestration, Automation, and Response (SOAR) should be implemented...