Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?A . InsiderB . Unskilled attackerC . Nation-stateD . HacktivistView AnswerAnswer: C Explanation: A nation-state is a threat actor that is sponsored by a government or a political...

December 29, 2023No CommentsREAD MORE +

Which of the following data classifications should be used to secure patient data?

A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?A . PrivateB . CriticalC . SensitiveD . PublicView AnswerAnswer: C Explanation: Data classification is a process of categorizing data...

December 29, 2023No CommentsREAD MORE +

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...

December 29, 2023No CommentsREAD MORE +

Which of the following types of social engineering attacks occurred?

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?A . Brand impersonationB . PretextingC ....

December 28, 2023No CommentsREAD MORE +

Which of the following best describes the program the company is setting up?

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?A . Open-source intelligenceB . Bug bountyC . Red teamD...

December 28, 2023No CommentsREAD MORE +

Which of the following strategies does this represent?

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?A . AcceptB . TransferC . MitigateD . AvoidView AnswerAnswer: B Explanation: Cyber insurance is a type of insurance that covers the financial losses and liabilities that result from cyberattacks,...

December 28, 2023No CommentsREAD MORE +

Which of the following methods would allow this functionality?

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?A . SSOB . LEAPC . MFAD...

December 28, 2023No CommentsREAD MORE +

Which of the following teams will conduct this assessment activity?

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering. Which of the following teams will conduct this assessment activity?A . WhiteB . PurpleC . BlueD . RedView AnswerAnswer: D Explanation: A red team is a group of security professionals who perform offensive...

December 27, 2023No CommentsREAD MORE +

Which of the following types of social engineering attacks occurred?

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?A . Brand impersonationB . PretextingC ....

December 26, 2023No CommentsREAD MORE +

Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the...

December 26, 2023No CommentsREAD MORE +