Which of the following options should the security analyst suggest to protect corporate data on these devices?

Correct Answer for the Question – Which of the following options should the security analyst suggest to protect corporate data on these devices? is given below A Chief Executive Officer (CEO) wants to implement BYOD in the environment. Which of the following options should the security analyst suggest to protect corporate data on these devices? (Choose … Read more

Which of the following Nmap commands would reveal common open ports and their versions?

Correct Answer for the Question – Which of the following Nmap commands would reveal common open ports and their versions? is given below A company requests a security assessment of its network. Permission is given, but no details are provided. It is discovered that the company has a web presence, and the company’s IP address is … Read more

Which of the following has MOST likely occurred?

Correct Answer for the Question – Which of the following has MOST likely occurred? is given below A company has a popular shopping cart website hosted geographically diverse locations. The company has started hosting static content on a content delivery network (CDN) to improve performance. The CDN provider has reported the company is occasionally sending attack … Read more

Which of the following is the BEST mitigation step to implement until the SQL servers can be upgraded to SP 2 with minimal impact to the network?

Correct Answer for the Question – Which of the following is the BEST mitigation step to implement until the SQL servers can be upgraded to SP 2 with minimal impact to the network? is given below An organization subscribes to multiple third-party security intelligence feeds. It receives a notification from one of these feeds indicating a … Read more

Which of the following security methods could be used to mitigate this risk?

Correct Answer for the Question – Which of the following security methods could be used to mitigate this risk? is given below During a quarterly review of user accounts and activity, a security analyst noticed that after a password reset the head of human resources has been logging in from multiple locations, including several overseas. Further … Read more

Which of the following approaches would BEST meet the requirements?

Correct Answer for the Question – Which of the following approaches would BEST meet the requirements? is given below After reading about data breaches at a competing company, senior leaders in an organization have grown increasingly concerned about social engineering attacks. They want to increase awareness among staff regarding this threat, but do not want to … Read more

Which of the following processes BEST describes this recommendation?

Correct Answer for the Question – Which of the following processes BEST describes this recommendation? is given below A worm was detected on multiple PCs within the remote office. The security analyst recommended that the remote office be blocked from the corporate network during the incident response. Which of the following processes BEST describes this recommendation? … Read more

Which of the following BEST describes why this tool was used?

Correct Answer for the Question – Which of the following BEST describes why this tool was used? is given below After implementing and running an automated patching tool, a security administrator ran a vulnerability scan that reported no missing patches found. Which of the following BEST describes why this tool was used? To create a chain … Read more

Which of the following controls should be put in place to secure the file server and ensure the images are not changed?

Correct Answer for the Question – Which of the following controls should be put in place to secure the file server and ensure the images are not changed? is given below A server contains baseline images that are deployed to sensitive workstations on a regular basis. The images are evaluated once per month for patching and … Read more

Which of the following steps should be taken NEXT?

Correct Answer for the Question – Which of the following steps should be taken NEXT? is given below Alerts have been received from the SIEM, indicating infections on multiple computers. Base on threat characteristics, these files were quarantined by the host-based antivirus program. At the same time, additional alerts in the SIEM show multiple blocked URLs … Read more