Which of the following procedures should the security responder apply to the situation?

Correct Answer for the Question – Which of the following procedures should the security responder apply to the situation? is given below An organization has recently deployed an EDR solution across its laptops, desktops, and server infrastructure. The organization’s server infrastructure is deployed in an IaaS environment. A database within the non-production environment has been misconfigured … Read more

Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly?

Correct Answer for the Question – Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly? is given below A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files … Read more

Which of the following tools did the penetration tester use?

Correct Answer for the Question – Which of the following tools did the penetration tester use? is given below A consulting firm was hired to conduct assessment for a company. During the first stage, a penetration tester used a tool that provided the following output:TCP 80 openTCP 443 openTCP 1434 filteredThe penetration tester then used a … Read more

Which of the following is the BEST solution in this scenario?

Correct Answer for the Question – Which of the following is the BEST solution in this scenario? is given below Ann, a corporate executive, has been the recent target of increasing attempts to obtain corporate secrets by competitors through advanced, well-funded means.Ann frequently leaves her laptop unattended and physically unsecure in hotel rooms during travel. A … Read more

Which of the following steps should be done FIRST?

Correct Answer for the Question – Which of the following steps should be done FIRST? is given below The Chief Financial Officer (CFO) of a major hospital system has received a ransom letter that demands a large sum of cryptocurrency be transferred to an anonymous account. If the transfer does not take place within ten hours, … Read more

A security engineer is employed by a hospital that was recently purchased by a corporation. Throughout the acquisition process, all data on the virtualized file servers must be shared by departments within both organizations. The security engineer considers data ownership to determine:

Correct Answer for the Question – A security engineer is employed by a hospital that was recently purchased by a corporation. Throughout the acquisition process, all data on the virtualized file servers must be shared by departments within both organizations. The security engineer considers data ownership to determine: is given below A security engineer is employed … Read more

Which of the following strategies should the engineer recommended be approved FIRST?

Correct Answer for the Question – Which of the following strategies should the engineer recommended be approved FIRST? is given below In the past, the risk committee at Company A has shown an aversion to even minimal amounts of risk acceptance. A security engineer is preparing recommendations regarding the risk of a proposed introducing legacy ICS … Read more

Which of the following is of MOST concern in this scenario?

Correct Answer for the Question – Which of the following is of MOST concern in this scenario? is given below The government is concerned with remote military missions being negatively being impacted by the use of technology that may fail to protect operational security. To remediate this concern, a number of solutions have been implemented, including … Read more

Which of the following types of concerns should the forensic investigator have about this work assignment?

Correct Answer for the Question – Which of the following types of concerns should the forensic investigator have about this work assignment? is given below A corporate forensic investigator has been asked to acquire five forensic images of an employee database application. There are three images to capture in the United States, one in the United … Read more

Which of the following documents should the project manager review?

Correct Answer for the Question – Which of the following documents should the project manager review? is given below A project manager is working with system owners to develop maintenance windows for system pathing and upgrades in a cloud-based PaaS environment.Management has indicated one maintenance windows will be authorized per month, but clients have stated they … Read more