Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button....

December 13, 2023No CommentsREAD MORE +

Which of the following meets these requirements?

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?A . Serverless frameworkB . Type 1 hvpervisorC . SD-WAND . SDNView AnswerAnswer: A Explanation: A serverless framework is a cloud-based application-hosting solution that meets the requirements of low-cost and cloud-based....

December 12, 2023No CommentsREAD MORE +

Which of the following types of social engineering attacks occurred?

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?A . Brand impersonationB . PretextingC ....

December 12, 2023No CommentsREAD MORE +

Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?A . encryption=offB . http://C . www.*.comD . :443View AnswerAnswer: B Explanation: A web filter is...

December 11, 2023No CommentsREAD MORE +

Which of the following steps should be taken first?

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?A . Air gap the system.B . Move the system to a different network segment.C . Create a change control request.D . Apply the patch to the system.View AnswerAnswer: C...

December 10, 2023No CommentsREAD MORE +

Which of the following is the best option?

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?A . Send out periodic security reminders.B . Update the content of new hire documentation.C . Modify the content of recurring training....

December 10, 2023No CommentsREAD MORE +

Which of the following automation techniques should a systems administrator use to streamline account creation?

The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?A . Guard rail scriptB . Ticketing workflowC . Escalation scriptD . User provisioning scriptView AnswerAnswer:...

December 9, 2023No CommentsREAD MORE +

Which of the following should the hosting provider consider first?

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?A . Local data protection regulationsB . Risks from hackers residing in other countriesC . Impacts to existing contractual obligationsD . Time zone differences in log correlationView...

December 8, 2023No CommentsREAD MORE +

Which of the following logs should the analyst use as a data source?

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst...

December 8, 2023No CommentsREAD MORE +

Which of the following should the analyst do?

A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following...

December 8, 2023No CommentsREAD MORE +