Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing?

Correct Answer for the Question – Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing? is given below A security analyst is investigating a security breach. Upon inspection of the audit an access logs, the analyst notices the host was accessed … Read more

Which of the following should be configured on the network clients?

Correct Answer for the Question – Which of the following should be configured on the network clients? is given below A security administrator has configured a RADIUS and a TACACS+ server on the company’s network. Network devices will be required to connect to the TACACS+ server for authentication and send accounting information to the RADIUS server. … Read more

Which of the following was recently added to the laptop?

Correct Answer for the Question – Which of the following was recently added to the laptop? is given below A salesperson often uses a USB drive to save and move files from a corporate laptop. The coprorate laptop was recently updated, and now the files on the USB are read-only. Which of the following was recently … Read more

Which of the following should the administrator recommend in the report?

Correct Answer for the Question – Which of the following should the administrator recommend in the report? is given below A security administrator is creating a risk assessment with regard to how to harden internal communications in transit between servers.Which of the following should the administrator recommend in the report? Configure IPSec in transport mode. Configure … Read more

Which of the following is the MOST likely explanation for this anomaly?

Correct Answer for the Question – Which of the following is the MOST likely explanation for this anomaly? is given below A security administrator has completed a monthly review of DNS server query logs. The administrator notices continuous name resolution attempts from a large number of internal hosts to a single Internet addressable domain name. The … Read more

Which may differ by department. Which of the following access controls would be the MOST appropriate for this situation?

Correct Answer for the Question – Which may differ by department. Which of the following access controls would be the MOST appropriate for this situation? is given below A security administrator needs to configure remote access to a file share so it can only be accessed between the hours of 9:00 a.m. and 5:00 p.m. Files … Read more

Which of the following is the best NEXT step for the analyst to take?

Correct Answer for the Question – Which of the following is the best NEXT step for the analyst to take? is given below An incident response analyst at a large corporation is reviewing proxy log data. The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the … Read more

Which of the following mobile deployment authentication types is being utilized?

Correct Answer for the Question – Which of the following mobile deployment authentication types is being utilized? is given below During a lessons learned meeting regarding a previous incident, the security team receives a follow-up action item with the following requirements: Allow authentication from within the United States anytimeAllow authentication if the user is accessing email … Read more

Which of the following is the MOST cost-effective way for the security analyst to prevent this?

Correct Answer for the Question – Which of the following is the MOST cost-effective way for the security analyst to prevent this? is given below A small- to medium-sized company wants to block the use of USB devices on its network. Which of the following is the MOST cost-effective way for the security analyst to prevent … Read more

Which of the following scenarios BEST describes an implementation of non-repudiation?

Correct Answer for the Question – Which of the following scenarios BEST describes an implementation of non-repudiation? is given below Which of the following scenarios BEST describes an implementation of non-repudiation? A user logs into a domain workstation and access network file shares for another department A user remotely logs into the mail server with another … Read more