Which of the following best describes the program the company is setting up?

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?A . Open-source intelligenceB . Bug bountyC . Red teamD...

September 21, 2024 No Comments READ MORE +

Which of the following types of sites is the best for this scenario?

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?A . Real-time recoveryB . HotC . ColdD . WarmView AnswerAnswer: C Explanation: A cold...

September 21, 2024 No Comments READ MORE +

Which of the following security techniques is the IT manager setting up?

An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?A . HardeningB . Employee monitoringC . Configuration...

September 20, 2024 No Comments READ MORE +

Which of the following social engineering techniques are being attempted?

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)A . TyposquattingB . PhishingC . ImpersonationD . VishingE . SmishingF . MisinformationView AnswerAnswer: B E Explanation:...

September 20, 2024 No Comments READ MORE +

Which of the following fulfills this request?

4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?A . access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32B . access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0C . access-list inbound permit ig...

September 20, 2024 No Comments READ MORE +

Which of the following types of controls is the company setting up?

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?A . CorrectiveB . PreventiveC . DetectiveD . DeterrentView AnswerAnswer: C Explanation: A detective control is a...

September 20, 2024 No Comments READ MORE +

Which of the following types of infections is present on the systems?

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of.ryk. Which of the following types of infections is present on the systems?A . VirusB . TrojanC . SpywareD . RansomwareView AnswerAnswer: D Explanation: Ransomware is a type of...

September 20, 2024 No Comments READ MORE +

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

Which of the following would be the best way to handle a critical business application that is running on a legacy server?A . SegmentationB . IsolationC . HardeningD . DecommissioningView AnswerAnswer: C Explanation: A legacy server is a server that is running outdated or unsupported software or hardware, which may...

September 20, 2024 No Comments READ MORE +

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?A . SCAPB . Net FlowC . AntivirusD . DLPView AnswerAnswer: D Explanation: DLP stands for Data Loss Prevention, which is a tool that can assist with detecting and preventing...

September 18, 2024 No Comments READ MORE +

Which of the following best describes this step?

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?A . Capacity planningB . RedundancyC . Geographic dispersionD . Tablet exerciseView AnswerAnswer: A...

September 17, 2024 No Comments READ MORE +