Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?A . ClientB . Third-party vendorC . Cloud providerD . DBAView AnswerAnswer: A Explanation: According to the shared responsibility model, the client and the cloud...

March 11, 2024 No Comments READ MORE +

Which of the following security techniques is the IT manager setting up?

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?A . HardeningB . Employee monitoringC . Configuration...

March 11, 2024 No Comments READ MORE +

Which of the following enables the use of an input field to run commands that can view or manipulate data?

Which of the following enables the use of an input field to run commands that can view or manipulate data?A . Cross-site scriptingB . Side loadingC . Buffer overflowD . SQL injectionView AnswerAnswer: D Explanation: = SQL injection is a type of attack that enables the use of an input...

March 11, 2024 No Comments READ MORE +

Which of the following are the best responses to this situation?

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated: “I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email...

March 10, 2024 No Comments READ MORE +

Which of the following encryption techniques should the security administrator use?

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?A . PartitionB . AsymmetricC . Full diskD . DatabaseView AnswerAnswer: C Explanation: Full disk encryption (FDE) is a technique that encrypts all the data on a hard drive,...

March 10, 2024 No Comments READ MORE +

Which of the following best describes this step?

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?A . Capacity planningB . RedundancyC . Geographic dispersionD . Tablet exerciseView AnswerAnswer: A...

March 10, 2024 No Comments READ MORE +

Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?A . encryption=offB . http://C . www.*.comD . :443View AnswerAnswer: B Explanation: A web filter is...

March 10, 2024 No Comments READ MORE +

Which of the following incident response activities describes this process?

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?A . AnalysisB . Lessons learnedC . DetectionD . ContainmentView AnswerAnswer: A Explanation: Analysis is the incident response activity that describes the process of understanding the...

March 10, 2024 No Comments READ MORE +

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?A . Risk toleranceB . Risk transferC . Risk registerD . Risk analysisView AnswerAnswer: C Explanation: A risk register is a document that records and tracks the risks associated with a project, system,...

March 10, 2024 No Comments READ MORE +

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Which of the following describes the reason root cause analysis should be conducted as part of incident response?A . To gather loCs for the investigationB . To discover which systems have been affectedC . To eradicate any trace of malware on the networkD . To prevent future incidents of the...

March 10, 2024 No Comments READ MORE +