Get Full Version of the Exam Question No.151A user is presented with the following items during the new-hire onboarding process:LaptopSecure USB drive Hardware OTP token External high-capacity HDD Password complexity policy Acceptable use policyHASP key Cable lockWhich of the following is one component of multifactor authentication?Secure USB driveCable lockHardware OTP tokenHASP keyCorrect Answer: C Question No.152Which of the following cryptographic algorithms Read more [...]
Get Full Version of the Exam Question No.141A system#39;s administrator has finished configuring firewall ACL to allow access to a new web answer.PERMIT TCP from: ANY to: PERMIT TCP from: ANY to: DENY TCP from: ANY to: ANYThe security administrator confirms form the following packet capture that there is network traffic from the internet to the web server:TCP; POST/default#39;sTCP; Read more [...]
Get Full Version of the Exam Question No.131To reduce disk consumption, an organization#39;s legal department has recently approved a new policy setting the data retention period for sent email at six months. Which of the following is theBEST way to ensure this goal is met?Create a daily encrypted backup of the relevant emails.Configure the email server to delete the relevant emails.Migrate the relevant emails into an quot;Archivedquot; folder.Implement automatic Read more [...]
Get Full Version of the Exam Question No.111An audit takes place after company-wide restricting, in which several employees changed roles. The following deficiencies are found during the audit regarding access to confidential data:Which of the following would be the BEST method to prevent similar audit findings in the future?Implement separation of duties for the payroll department.Implement a DLP solution on the payroll and human resources servers.Implement Read more [...]
Get Full Version of the Exam Question No.121A new firewall has been places into service at an organization. However, a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?The firewall should be configured to prevent user traffic form matching the implicit deny rule.The firewall Read more [...]
Get Full Version of the Exam Question No.101A datacenter recently experienced a breach. When access was gained, an RF device was used to access an air-gapped and locked server rack. Which of the following would Best prevent this type of attack?Faraday cageSmart cardsinfrared detectionAlarmsCorrect Answer: A Question No.102During a monthly vulnerability scan, a server was flagged for being vulnerable to an Apache Struts exploit. Upon further investigation, Read more [...]
Get Full Version of the Exam Question No.81A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?Transferring the riskAccepting the riskAvoiding the riskMigrating the riskCorrect Answer: A Question No.82Which of the following characteristics differentiate a rainbow table Read more [...]
Get Full Version of the Exam Question No.91A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?Implement time-of-day restrictions.Audit file access times.Secretly install a hidden surveillance cameraRequire swipe-card access to enter the labCorrect Answer: D Question No.92A Read more [...]
Get Full Version of the Exam Question No.71A company is currently using the following configuration:IAS server with certificate-based EAP-PEAP and MSCHAP Unencrypted authentication via PAPA security administrator needs to configure a new wireless setup with the following configurations:PAP authentication methodPEAP and EAP provide two-factor authenticationWhich of the following forms of authentication are being used? (Select two.)PAPPEAPMSCHAPPEAP- MSCHAPEAPEAP-PEAPCorrect Read more [...]
Get Full Version of the Exam Question No.61Which of the following threat actors is MOST likely to steal a company#39;s proprietary information to gain a market edge and reduce time to market?CompetitorHacktivistInsiderOrganized crime.Correct Answer: A Question No.62Which of the following types of cloud infrastructures would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources?PrivateHybridPublicCommunityCorrect Read more [...]
Get Full Version of the Exam Question No.51An organization is using a tool to perform a source code review. Which of the following describes the case in which the tool incorrectly identifies the vulnerability?False negativeTrue negativeFalse positiveTrue positiveCorrect Answer: C Question No.52Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. The network Read more [...]