Which of the following activities describes the act of ignoring detected activity in the future?
A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?A . TuningB . AggregatingC . QuarantiningD . ArchivingView AnswerAnswer: A Explanation: Tuning is the activity of adjusting the configuration or...
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?A . AutomationB . Compliance checklistC . AttestationD . Manual auditView AnswerAnswer: A Explanation: Automation is the best way to consistently determine on a daily basis whether security...
Which of the following best describes this policy?
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?A . EnumerationB . SanitizationC . DestructionD . InventoryView AnswerAnswer: B Explanation: Sanitization is the process of removing sensitive data from a storage device or a system before...
Which of the following must be considered when designing a high-availability network? (Choose two).
Which of the following must be considered when designing a high-availability network? (Choose two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: A, E Explanation: A high-availability network is a network that is designed to minimize downtime and...
Which of the following would be the best way to block unknown programs from executing?
Which of the following would be the best way to block unknown programs from executing?A . Access control listB . Application allow list.C . Host-based firewallD . DLP solutionView AnswerAnswer: B Explanation: An application allow list is a security technique that specifies which applications are permitted to run on a...
Which of the following reconnaissance types is the tester performing?
A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?A . ActiveB . PassiveC . DefensiveD . OffensiveView AnswerAnswer: A Explanation: Active reconnaissance is a type of reconnaissance...
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...
Which of the following teams will conduct this assessment activity?
A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering. Which of the following teams will conduct this assessment activity?A . WhiteB . PurpleC . BlueD . RedView AnswerAnswer: D Explanation: A red team is a group of security professionals who perform offensive...
Which of the following can be used to identify potential attacker activities without affecting production servers?
Which of the following can be used to identify potential attacker activities without affecting production servers?A . Honey potB . Video surveillanceC . Zero TrustD . GeofencingView AnswerAnswer: A Explanation: A honey pot is a system or a network that is designed to mimic a real production server and attract...
Which of the following is the best option?
A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?A . Send out periodic security reminders.B . Update the content of new hire documentation.C . Modify the content of recurring training....