Which of the following would accomplish the manager's goal?

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses: . Something you know . Something you have . Something you are Which of the following would accomplish the manager's goal?A . Domain name, PKI, GeolP lookupB . VPN IP address, company ID, facial structureC...

September 16, 2024 No Comments READ MORE +

Which of the following are the best responses to this situation?

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated: “I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email...

September 15, 2024 No Comments READ MORE +

Which of the following activities describes the act of ignoring detected activity in the future?

A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?A . TuningB . AggregatingC . QuarantiningD . ArchivingView AnswerAnswer: A Explanation: Tuning is the activity of adjusting the configuration or...

September 14, 2024 No Comments READ MORE +

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?A . AutomationB . Compliance checklistC . AttestationD . Manual auditView AnswerAnswer: A Explanation: Automation is the best way to consistently determine on a daily basis whether security...

September 14, 2024 No Comments READ MORE +

Which of the following best describes this policy?

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?A . EnumerationB . SanitizationC . DestructionD . InventoryView AnswerAnswer: B Explanation: Sanitization is the process of removing sensitive data from a storage device or a system before...

September 14, 2024 No Comments READ MORE +

Which of the following must be considered when designing a high-availability network? (Choose two).

Which of the following must be considered when designing a high-availability network? (Choose two).A . Ease of recoveryB . Ability to patchC . Physical isolationD . ResponsivenessE . Attack surfaceF . Extensible authenticationView AnswerAnswer: A, E Explanation: A high-availability network is a network that is designed to minimize downtime and...

September 14, 2024 No Comments READ MORE +

Which of the following would be the best way to block unknown programs from executing?

Which of the following would be the best way to block unknown programs from executing?A . Access control listB . Application allow list.C . Host-based firewallD . DLP solutionView AnswerAnswer: B Explanation: An application allow list is a security technique that specifies which applications are permitted to run on a...

September 13, 2024 No Comments READ MORE +

Which of the following reconnaissance types is the tester performing?

A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?A . ActiveB . PassiveC . DefensiveD . OffensiveView AnswerAnswer: A Explanation: Active reconnaissance is a type of reconnaissance...

September 13, 2024 No Comments READ MORE +

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?A . Disaster recovery planB . Incident response procedureC . Business continuity planD . Change management procedureView AnswerAnswer: D Explanation: A change management procedure is a set of steps and guidelines that...

September 12, 2024 No Comments READ MORE +

Which of the following teams will conduct this assessment activity?

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering. Which of the following teams will conduct this assessment activity?A . WhiteB . PurpleC . BlueD . RedView AnswerAnswer: D Explanation: A red team is a group of security professionals who perform offensive...

September 12, 2024 No Comments READ MORE +