Which of the following best describes the user’s activity?

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user’s activity?A . Penetration testingB . Phishing campaignC . External auditD . Insider threatView AnswerAnswer: D Explanation: An insider threat is...

March 15, 2024No CommentsREAD MORE +

Which of the following would be most relevant for the analyst to evaluate?

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?A . Secured zonesB . Subject roleC . Adaptive identityD . Threat scope reductionView AnswerAnswer: D Explanation: The data plane, also known as the...

March 15, 2024No CommentsREAD MORE +

Which of the following scenarios describes a possible business email compromise attack?

Which of the following scenarios describes a possible business email compromise attack?A . An employee receives a gift card request in an email that has an executive's name in the display field of the email.B . Employees who open an email attachment receive messages demanding payment in order to access...

March 15, 2024No CommentsREAD MORE +

Which of the following options is the most appropriate?

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?A . Testing input validation on the user input fieldsB . Performing code signing on company-developed softwareC . Performing static code analysis on the softwareD ....

March 15, 2024No CommentsREAD MORE +

Which of the following can be used to identify potential attacker activities without affecting production servers?

Which of the following can be used to identify potential attacker activities without affecting production servers?A . Honey potB . Video surveillanceC . Zero TrustD . GeofencingView AnswerAnswer: A Explanation: A honey pot is a system or a network that is designed to mimic a real production server and attract...

March 15, 2024No CommentsREAD MORE +

Which of the following is the most effective way to limit this access?

A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?A . Data maskingB . EncryptionC . Geolocation policyD . Data sovereignty regulationView...

March 14, 2024No CommentsREAD MORE +

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?A . InsiderB . Unskilled attackerC . Nation-stateD . HacktivistView AnswerAnswer: C Explanation: A nation-state is a threat actor that is sponsored by a government or a political...

March 14, 2024No CommentsREAD MORE +

Which of the following is the best option?

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?A . Send out periodic security reminders.B . Update the content of new hire documentation.C . Modify the content of recurring training....

March 14, 2024No CommentsREAD MORE +

Which of the following actions would prevent this issue?

While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?A . Documenting the...

March 14, 2024No CommentsREAD MORE +

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...

March 14, 2024No CommentsREAD MORE +