Which of the following should the company use to secure its website if the company is concerned with convenience and cost?
A retail company that is launching @ new website to showcase the company’s product line and other information for online shoppers registered the following URLs: * www companysite com * shop companysite com * about-us companysite com contact-us. companysite com secure-logon company site com Which of the following should the...
A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss.
A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategyA . Incremental backups followed by differential backupsB ....
Which of the following BEST describes what is happening?
During a Chief Information Security Officer (CISO) convention to discuss security awareness, the attendees are provided with a network connection to use as a resource. As the convention progresses, one of the attendees starts to notice delays in the connection, and the HIIPS site requests are reverting to HTTP. Which...
Which of the following types of malware is MOST likely infecting the hosts?
A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?A . A RATB . RansomwareC...
Which of the following should the network analyst enable to meet the requirement?
A network analyst is setting up a wireless access point for a home office in a remote, rural location. The requirement is that users need to connect to the access point securely but do not want to have to remember passwords. Which of the following should the network analyst enable...
Which of the following types of attacks has occurred?
After a phishing scam fora user's credentials, the red team was able to craft payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session. Which of the following types of attacks has occurred?A . Privilege escalationB . Session replayC ....
Which of the following security solutions would mitigate the risk of future data disclosures?
Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would...
Which of the following control types does this BEST represent?
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?A . PreventiveB . CompensatingC . CorrectiveD . DetectiveView AnswerAnswer: D Explanation: A SIEM is a security solution that helps detect security incidents by...
Which of the following recovery solutions would be the BEST option to meet these requirements?
A systems administrator is considering different backup solutions for the IT infrastructure. The company is looking for a solution that offers the fastest recovery time while also saving the most amount of storage used to maintain the backups. Which of the following recovery solutions would be the BEST option to...
Which of the following would MOST likely be considered a benefit of this certification?
An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?A . It allows for the sharing of digital forensics data across organizationsB . It provides insurance in case of a data breachC . It provides complimentary training and...