Which of the following is the best explanation for what the security analyst has discovered?
A security analyst reviews domain activity logs and notices the following: Which of the following is the best explanation for what the security analyst has discovered?A . The user jsmith's account has been locked out.B . A keylogger is installed on [smith's workstationC . An attacker is attempting to brute...
Which of the following methods would allow this functionality?
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?A . SSOB . LEAPC . MFAD...
50.10.25 32 port 53
50.10.25 32 port 53 D. Access list outbound permit 10.50.10.25 32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0.0.0.0.0.0/0 port 53View AnswerAnswer: D Explanation: The correct answer is D because it allows only the device with the IP address 10.50.10.25 to send outbound DNS requests on port 53, and denies...
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?A . EncryptionB . HashingC . MaskingD . TokenizationView AnswerAnswer: C Explanation: Masking is a method to secure credit card data that...
Which of the following data classifications should be used to secure patient data?
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?A . PrivateB . CriticalC . SensitiveD . PublicView AnswerAnswer: C Explanation: Data classification is a process of categorizing data...
Which of the following is required for an organization to properly manage its restore process in the event of system failure?
Which of the following is required for an organization to properly manage its restore process in the event of system failure?A . IRPB . DRPC . RPOD . SDLCView AnswerAnswer: B Explanation: A disaster recovery plan (DRP) is a set of policies and procedures that aim to restore the normal...
Which of the following is the most important consideration during development?
A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies. Which of the following is the most important consideration during development?A . ScalabilityB . AvailabilityC . CostD . Ease of deploymentView AnswerAnswer: B Explanation: Availability is the ability of a system or service...
Which of the following provides the details about the terms of a test with a third-party penetration tester?
Which of the following provides the details about the terms of a test with a third-party penetration tester?A . Rules of engagementB . Supply chain analysisC . Right to audit clauseD . Due diligenceView AnswerAnswer: A Explanation: Rules of engagement are the detailed guidelines and constraints regarding the execution of...
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?A . InsiderB . Unskilled attackerC . Nation-stateD . HacktivistView AnswerAnswer: C Explanation: A nation-state is a threat actor that is sponsored by a government or a political...
Which of the following changes would allow users to access the site?
Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked. Which of the following changes would allow users to access the site?A . Creating a firewall rule to allow HTTPS trafficB ....