Which of the following types of controls is the company setting up?

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?A . CorrectiveB . PreventiveC . DetectiveD . DeterrentView AnswerAnswer: C Explanation: A detective control is a...

March 7, 2025 No Comments READ MORE +

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

Which of the following would be the best way to handle a critical business application that is running on a legacy server?A . SegmentationB . IsolationC . HardeningD . DecommissioningView AnswerAnswer: B Explanation: A legacy server is a server that is running outdated or unsupported software or hardware, which may...

March 4, 2025 No Comments READ MORE +

Which of the following would accomplish the manager's goal?

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses: . Something you know . Something you have . Something you are Which of the following would accomplish the manager's goal?A . Domain name, PKI, GeolP lookupB . VPN IP address, company ID, facial structureC...

March 2, 2025 No Comments READ MORE +

Which of the following security benefits do these actions provide?

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.) A. If a security incident occurs on the device, the correct employee can be notified. B. The security team will be...

March 2, 2025 No Comments READ MORE +

Which of the following would be most relevant for the analyst to evaluate?

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?A . Secured zonesB . Subject roleC . Adaptive identityD . Threat scope reductionView AnswerAnswer: A Explanation: Secured zones are a key component of...

February 26, 2025 No Comments READ MORE +

Which of the following most likely occurred?

A systems administrator receives the following alert from a file integrity monitoring tool: The hash of the cmd.exe file has changed. The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?A . The end...

February 25, 2025 No Comments READ MORE +

Which of the following strategies does this represent?

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?A . AcceptB . TransferC . MitigateD . AvoidView AnswerAnswer: B Explanation: Cyber insurance is a type of insurance that covers the financial losses and liabilities that result from cyberattacks,...

February 23, 2025 No Comments READ MORE +

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...

February 23, 2025 No Comments READ MORE +

Which of the following best describes the actions taken by the organization?

An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?A . ExceptionB . SegmentationC . Risk transferD . Compensating controlsView AnswerAnswer: D Explanation: Compensating controls are alternative security measures that are implemented...

February 19, 2025 No Comments READ MORE +

Which of the following types of social engineering attacks occurred?

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?A . Brand impersonationB . PretextingC ....

February 19, 2025 No Comments READ MORE +