Question
** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 A security administrator is creating a
** Please with an explanation if possible **
*Please answers all or leave it to another expert*
Question #:1
A security administrator is creating a risk assessment on BYOD. One of the requirements of the risk assessment is to address the following
Centrally managing mobile devices
Data loss prevention
Which of the following recommendations should the administrator include in the assessment? (Select TWO)
implement encryption.
implement hashing.
implement an MDM with mobile device hardening.
implement a VPN with secure connection in webmail.
implement and allow cloud storage features on the network.
-------------------------------------------------------------------------------------------------------------
Question #:2
Confidential corporate data was recently stolen by an attacker who exploited data transport protections. Which of the following vulnerabilities is the MOST likely cause of this data breach?
Resource exhaustion on the VPN concentrators
Weak SSL cipher strength
Improper input handling on the FTP site
Race condition on the packet inspection firewall
-------------------------------------------------------------------------------------------------------------
Question #:3
A security consultant is analyzing data from a recent compromise. The following data points are documented
Access to data on share drives and certain networked hosts was lost after an employee logged in to an interactive session as a privileged user.
The data was unreadable by any known commercial software.
The issue spread through the enterprise via SMB only when certain users accessed data.
Removal instructions were not available from any major antivirus vendor.
Which of the following types of malware is this example of?
RAT
Ransomware
Backdoor
Keylogger
Worm
------------------------------------------------------------------------------------------------------------- Question #:4 An organization has the following password policies:
Passwords must be at least 16 characters long. A password cannot be the same as any previous 20 passwords. Three failed login attempts will lock the account for five minutes. Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol.
A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on a completely separate server. Which of the following is MOST likely the issue and the best solution?
Some users are reusing passwords for different systems; the organization should scan for password reuse across systems.
The organization has improperly configured single sign-on; the organization should implement a RADIUS server to control account logins.
User passwords are not sufficiently long or complex: the organization should increase the complexity and length requirements for passwords.
The trust relationship between the two servers has been compromised: the organization should place each server on a separate VLAN.
-------------------------------------------------------------------------------------------------------------
Question #:5
A coding error has been discovered on a customer-facing website. The error causes each request to return confidential PHI data for the incorrect organization. The IT department is unable to identify the specific customers who are affected. As a result, all customers must be notified of the potential breach. Which of the following would allow the team to determine the scope of future incidents?
Intrusion detection system
Database access monitoring
Application fuzzing
Monthly vulnerability scans
------------------------------------------------------------------------------------------------------------- Question #:6 Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
Unsecured root accounts
Zero-day Shared tenancy
Insider threat
-------------------------------------------------------------------------------------------------------------
Question #:7 A security analyst wants to limit the use of USB and external drives to protect against malware. as well as protect les leaving a users computer. Which of the following is the BEST method to use?
Firewall
Router
Antivirus software
Data loss prevention
------------------------------------------------------------------------------------------------------------- Question #:8 A first responder needs to collect digital evidence from a compromised headless virtual host. Which of the following should the first responder collect FIRST?
Virtual memory
BIOS configuration
Snapshot
RAM
------------------------------------------------------------------------------------------------------------- Question #:9 An organization was recently compromised by an attacker who used a server certificate with the company's domain issued by an irrefutable CA. Which of the following should be used to mitigate this risk in the future?
OCSP
DNSSEC
Corticated pinning
Key escrow ------------------------------------------------------------------------------------------------------------- Question #:10
Which of the following would MOST likely support the integrity of a voting machine?
Asymmetric encryption
Blockchain
Transport Layer Security
Perfect forward secrecy
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started