Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing?

Correct Answer for the Question – Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing? is given below A security analyst is investigating a security breach. Upon inspection of the audit an access logs, the analyst notices the host was accessed … Read more

Which of the following should be configured on the network clients?

Correct Answer for the Question – Which of the following should be configured on the network clients? is given below A security administrator has configured a RADIUS and a TACACS+ server on the company’s network. Network devices will be required to connect to the TACACS+ server for authentication and send accounting information to the RADIUS server. … Read more

Which of the following is the BEST reason for salting a password hash before it is stored in a database?

Correct Answer for the Question – Which of the following is the BEST reason for salting a password hash before it is stored in a database? is given below Which of the following is the BEST reason for salting a password hash before it is stored in a database? To prevent duplicate values from being stored … Read more

Which of the following is the MOST likely cause for this?

Correct Answer for the Question – Which of the following is the MOST likely cause for this? is given below When accessing a popular website, a user receives a warming that the certificate for the website is not valid. Upon investigation, it was noted that the certificate is not revoked and the website is working fine … Read more

Which of the following strategies is the security engineer executing?

Correct Answer for the Question – Which of the following strategies is the security engineer executing? is given below A security engineer implements multiple technical measures to secure an enterprise network. The engineer also works with the Chief Information Officer (CIO) to implement policies to govern user behavior.Which of the following strategies is the security engineer … Read more

Which of the following concepts is MOST appropriate?

Correct Answer for the Question – Which of the following concepts is MOST appropriate? is given below A company is planning to build an internal website that allows for access to outside contracts and partners. A majority of the content will only be to internal employees with the option to share.Which of the following concepts is … Read more

Which of the following would BEST prevent this from happening?

Correct Answer for the Question – Which of the following would BEST prevent this from happening? is given below A corporation is concerned that, if a mobile device is lost, any sensitive information on the device could be accessed by third parties. Which of the following would BEST prevent this from happening? Initiate remote wiping on … Read more

Which of the following methods would BEST fit the needs of the CISO?

Correct Answer for the Question – Which of the following methods would BEST fit the needs of the CISO? is given below A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to access the company’s internal network securely without allowing access to systems beyond the scope of their project. … Read more

Which of the following would BEST prevent this issue in the futue?

Correct Answer for the Question – Which of the following would BEST prevent this issue in the futue? is given below Users are attempting to access a company’s website but are transparently redirected to another websites. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the futue? DNSSEC … Read more

Which of the following is a security benefit of implementing an imaging solution?

Correct Answer for the Question – Which of the following is a security benefit of implementing an imaging solution? is given below An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently has 500 PCs active on the network. the Chief Information Security Officer (CISO) suggests that the organization employ desktop imaging technology … Read more