another one Flashcards
An organization has a growing workforce that is mostly driven b additions to the sales department. EWach newly hired salesperson relies on a mobile device to conduct business. The CIO is wondering if the organization may need to scale down just as quickly as it scaled up. The CIO is also concerned about the organization’s security and customer privacy.
Which of the following would be BEST to address the CIO’s concerns?
Implement BYOD for the sales department while leveraging the MDM
A University with remote campuses, which all use different service providers, loses internet connectivity across all locations. After a few minutes, Internet and VoIP services are restroed, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected.
Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads.
Which of the following BEST describe this type of attack? (Choose two)
DoS
Memory leak
A company’s CIO is meeting with the CISO to plan some activities to enhance the skill levels of the company’s developers.
Which of the following would be MOST suitable for training the developers’?
A phishing simulation
A network administrator has been asked to install an IDS to improve the secuirty posture of an organization.
Which of the following control types is an IDS?
Detective
Which of the following will Most likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human management interfaces that are accessible over the Internet via a web interface? (Choose Two)
WeakEncryption
Server-side request forgery
A finacial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems.
Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the orgaization’s securit posture?
Configure the DLP policies to whitelist this application with the specific PII
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password.
Which of the folowing would meet the organizations needs for a third factor.
FIngerprints
A network admin is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI
Which of the following should the admin configure?
802.1X
Malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server.
Which of the following files should be given to the forensics firm?
Dump
After entering a userna,me and password, and admin must gesture on a touch screen.
Which of the follwoing demonstrates what the admin is providing?
Two-factor authentication
A worldwide manufaturing company has been experiencing email account compromised. In one incident a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil.
Which of the following account policies would BEST prevent this type of attack?
Geofencing
A security admin needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously.
Which of the following RAID configs should the admin use?
Raid 5
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?
Containment
A securityy analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log:
Which of the following can the security analyst conclude?
A service acount password may have been changed, resulting in continuous failed logins within the application.
Which of the following types of controls is a turnstile
Physical