Which of the following types of controls is the company setting up?

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?A . CorrectiveB . PreventiveC . DetectiveD . DeterrentView AnswerAnswer: C Explanation: A detective control is a...

September 20, 2024 No Comments READ MORE +

Which of the following types of infections is present on the systems?

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of.ryk. Which of the following types of infections is present on the systems?A . VirusB . TrojanC . SpywareD . RansomwareView AnswerAnswer: D Explanation: Ransomware is a type of...

September 20, 2024 No Comments READ MORE +

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

Which of the following would be the best way to handle a critical business application that is running on a legacy server?A . SegmentationB . IsolationC . HardeningD . DecommissioningView AnswerAnswer: C Explanation: A legacy server is a server that is running outdated or unsupported software or hardware, which may...

September 20, 2024 No Comments READ MORE +

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?A . SCAPB . Net FlowC . AntivirusD . DLPView AnswerAnswer: D Explanation: DLP stands for Data Loss Prevention, which is a tool that can assist with detecting and preventing...

September 18, 2024 No Comments READ MORE +

Which of the following best describes this step?

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?A . Capacity planningB . RedundancyC . Geographic dispersionD . Tablet exerciseView AnswerAnswer: A...

September 17, 2024 No Comments READ MORE +

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Which of the following describes the reason root cause analysis should be conducted as part of incident response?A . To gather loCs for the investigationB . To discover which systems have been affectedC . To eradicate any trace of malware on the networkD . To prevent future incidents of the...

September 17, 2024 No Comments READ MORE +

Which of the following is the most effective way to limit this access?

A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?A . Data maskingB . EncryptionC . Geolocation policyD . Data sovereignty regulationView...

September 17, 2024 No Comments READ MORE +

Which of the following actions would prevent this issue?

While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?A . Documenting the...

September 17, 2024 No Comments READ MORE +

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?A . HacktivistB . WhistleblowerC . Organized crimeD . Unskilled attackerView AnswerAnswer: C Explanation: Organized crime is a type of threat actor that is motivated by...

September 17, 2024 No Comments READ MORE +

Which of the following would be the best solution?

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?A . RDP serverB . Jump serverC . Proxy serverD . HypervisorView AnswerAnswer: B Explanation: = A jump server is...

September 16, 2024 No Comments READ MORE +