Which of the following should a database administrator use to access the database servers?

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?A . Jump serverB . RADIUSC . HSMD . Load balancerView AnswerAnswer: A Explanation: A jump server is a...

September 28, 2024 No Comments READ MORE +

You are security administrator investigating a potential infection on a network

HOTSPOT You are security administrator investigating a potential infection on a network. Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected. View AnswerAnswer: Explanation: Based on the logs, it seems that the host that...

September 27, 2024 No Comments READ MORE +

Which of the following best addresses the risks associated with procuring counterfeit hardware?

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?A . A thorough analysis of the supply chainB . A legally enforceable corporate acquisition policyC . A right to audit clause in vendor contracts and SOWsD...

September 27, 2024 No Comments READ MORE +

Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?

Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?A . Provisioning resourcesB . Disabling accessC . Reviewing change approvalsD . Escalating permission requestsView AnswerAnswer: B Explanation: Disabling access is an automation use case that...

September 26, 2024 No Comments READ MORE +

Which of the following would be most relevant for the analyst to evaluate?

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?A . Secured zonesB . Subject roleC . Adaptive identityD . Threat scope reductionView AnswerAnswer: D Explanation: The data plane, also known as the...

September 26, 2024 No Comments READ MORE +

Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the...

September 26, 2024 No Comments READ MORE +

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?A . Compensating controlB . Network segmentationC . Transfer of riskD . SNMP trapsView AnswerAnswer: A Explanation: A compensating control is a security measure that is implemented...

September 26, 2024 No Comments READ MORE +

Which of the following best describes the user’s activity?

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user’s activity?A . Penetration testingB . Phishing campaignC . External auditD . Insider threatView AnswerAnswer: D Explanation: An insider threat is...

September 25, 2024 No Comments READ MORE +

Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?

Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?A . JailbreakingB . Memory injectionC . Resource reuseD . Side loadingView AnswerAnswer: D Explanation: Side loading is the process of installing software outside of a manufacturer’s approved software repository. This can expose the...

September 24, 2024 No Comments READ MORE +

Which of the following is a primary security concern for a company setting up a BYOD program?

Which of the following is a primary security concern for a company setting up a BYOD program?A . End of lifeB . Buffer overflowC . VM escapeD . JailbreakingView AnswerAnswer: D Explanation: Jailbreaking is a primary security concern for a company setting up a BYOD (Bring Your Own Device) program....

September 24, 2024 No Comments READ MORE +