Which of the following options should the security analyst suggest to protect corporate data on these devices?

Correct Answer for the Question – Which of the following options should the security analyst suggest to protect corporate data on these devices? is given below A Chief Executive Officer (CEO) wants to implement BYOD in the environment. Which of the following options should the security analyst suggest to protect corporate data on these devices? (Choose … Read more

Which of the following Nmap commands would reveal common open ports and their versions?

Correct Answer for the Question – Which of the following Nmap commands would reveal common open ports and their versions? is given below A company requests a security assessment of its network. Permission is given, but no details are provided. It is discovered that the company has a web presence, and the company’s IP address is … Read more

Which of the following tools would be appropriate to use in this case?

Correct Answer for the Question – Which of the following tools would be appropriate to use in this case? is given below A Chief Information Security Officer (CISO) needs to ensure that a laptop image remains unchanged and can be verified before authorizing the deployment of the image to 4000 laptops. Which of the following tools … Read more

Which of the following stakeholders should the analyst provide the reports?

Correct Answer for the Question – Which of the following stakeholders should the analyst provide the reports? is given below During a tabletop exercise, it is determined that a security analyst is required to ensure patching and scan reports are available during an incident, as well as documentation of all critical systems. To which of the … Read more

Which of the following must the team prepare to allow the data to be used in court as evidence?

Correct Answer for the Question – Which of the following must the team prepare to allow the data to be used in court as evidence? is given below A cyber-incident response team is responding to a network intrusion incident on a hospital network. Which of the following must the team prepare to allow the data to … Read more

Which of the following could help the analyst recover the deleted evidence?

Correct Answer for the Question – Which of the following could help the analyst recover the deleted evidence? is given below An analyst received a forensically sound copy of an employee’s hard drive. The employee’s manager suspects inappropriate images may have been deleted from the hard drive. Which of the following could help the analyst recover … Read more

Which of the following describes why it is important to include scope within the rules of engagement of a penetration test?

Correct Answer for the Question – Which of the following describes why it is important to include scope within the rules of engagement of a penetration test? is given below Which of the following describes why it is important to include scope within the rules of engagement of a penetration test? To ensure the network segment … Read more

Which of the following is the BEST solution to avoid production server downtime due to these types of scans?

Correct Answer for the Question – Which of the following is the BEST solution to avoid production server downtime due to these types of scans? is given below Policy allows scanning of vulnerabilities during production hours, but production servers have been crashing lately due to unauthorized scans performed by junior technicians. Which of the following is … Read more

Which of the following types of data incurs the highest regulatory constraints?

Correct Answer for the Question – Which of the following types of data incurs the highest regulatory constraints? is given below A medical organization recently started accepting payments over the phone. The manager is concerned about the impact of the storage of different types of data. Which of the following types of data incurs the highest … Read more

Which of the following processes is this type of information normally gathered?

Correct Answer for the Question – Which of the following processes is this type of information normally gathered? is given below A penetration tester is preparing for an audit of critical systems that may impact the security of the environment. This includes the external perimeter and the internal perimeter of the environment. During which of the … Read more