Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...

September 12, 2024No CommentsREAD MORE +

Which of the following teams will conduct this assessment activity?

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering. Which of the following teams will conduct this assessment activity?A . WhiteB . PurpleC . BlueD . RedView AnswerAnswer: D Explanation: A red team is a group of security professionals who perform offensive...

September 12, 2024No CommentsREAD MORE +

Which of the following can be used to identify potential attacker activities without affecting production servers?

Which of the following can be used to identify potential attacker activities without affecting production servers?A . Honey potB . Video surveillanceC . Zero TrustD . GeofencingView AnswerAnswer: A Explanation: A honey pot is a system or a network that is designed to mimic a real production server and attract...

September 12, 2024No CommentsREAD MORE +

Which of the following is the best option?

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?A . Send out periodic security reminders.B . Update the content of new hire documentation.C . Modify the content of recurring training....

September 12, 2024No CommentsREAD MORE +

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?A . ClientB . Third-party vendorC . Cloud providerD . DBAView AnswerAnswer: A Explanation: According to the shared responsibility model, the client and the cloud...

September 12, 2024No CommentsREAD MORE +

Which of the following would be the best way to block unknown programs from executing?

Which of the following would be the best way to block unknown programs from executing?A . Access control listB . Application allow list.C . Host-based firewallD . DLP solutionView AnswerAnswer: B Explanation: An application allow list is a security technique that specifies which applications are permitted to run on a...

March 19, 2024No CommentsREAD MORE +

Which of the following best describes this policy?

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?A . EnumerationB . SanitizationC . DestructionD . InventoryView AnswerAnswer: B Explanation: Sanitization is the process of removing sensitive data from a storage device or a system before...

March 18, 2024No CommentsREAD MORE +

Which of the following security control types does an acceptable use policy best represent?

Which of the following security control types does an acceptable use policy best represent?A . DetectiveB . CompensatingC . CorrectiveD . PreventiveView AnswerAnswer: D Explanation: An acceptable use policy (AUP) is a set of rules that govern how users can access and use a corporate network or the internet. The...

March 17, 2024No CommentsREAD MORE +

Which of the following provides the details about the terms of a test with a third-party penetration tester?

Which of the following provides the details about the terms of a test with a third-party penetration tester?A . Rules of engagementB . Supply chain analysisC . Right to audit clauseD . Due diligenceView AnswerAnswer: A Explanation: Rules of engagement are the detailed guidelines and constraints regarding the execution of...

March 17, 2024No CommentsREAD MORE +

Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type...

March 17, 2024No CommentsREAD MORE +