Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing?

Correct Answer for the Question – Which of the following are the MOST likely attack vector and tool the analyst should use to determine if the attack is still ongoing? is given below A security analyst is investigating a security breach. Upon inspection of the audit an access logs, the analyst notices the host was accessed … Read more

Which of the following should be configured on the network clients?

Correct Answer for the Question – Which of the following should be configured on the network clients? is given below A security administrator has configured a RADIUS and a TACACS+ server on the company’s network. Network devices will be required to connect to the TACACS+ server for authentication and send accounting information to the RADIUS server. … Read more

Which of the following would assist with this?

Correct Answer for the Question – Which of the following would assist with this? is given below A company wants to ensure users are only logging into the system from their laptops when they are on site. Which of the following would assist with this? Geofencing Smart cards Biometrics Tokens Correct Answer The Correct Answer for … Read more

Which of the following is the MOST likely cause of this behavior?

Correct Answer for the Question – Which of the following is the MOST likely cause of this behavior? is given below A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrator, however, does not see any suspicious processes running. A prior technician’s notes indicate the machine has been … Read more

Which of the following should be used to encrypt the message?

Correct Answer for the Question – Which of the following should be used to encrypt the message? is given below A user needs to transmit confidential information to a third party.Which of the following should be used to encrypt the message? AES SHA-2 SSL RSA Correct Answer The Correct Answer for this Question is AES Explanation … Read more

Which of the following forms of testing does this BEST describe?

Correct Answer for the Question – Which of the following forms of testing does this BEST describe? is given below A company hired a firm to test the security posture of its database servers and determine if any vulnerabilities can be exploited. The company provided limited imformation pertaining to the infrastructure and database server. Which of … Read more

Which of the following encryption algorithms is used primarily to secure data at rest?

Correct Answer for the Question – Which of the following encryption algorithms is used primarily to secure data at rest? is given below Which of the following encryption algorithms is used primarily to secure data at rest? AES SSL TLS RSA Correct Answer The Correct Answer for this Question is AES Explanation The Question – Which … Read more

Which of the following is a major difference between XSS attacks and remote code exploits?

Correct Answer for the Question – Which of the following is a major difference between XSS attacks and remote code exploits? is given below Which of the following is a major difference between XSS attacks and remote code exploits? XSS attacks use machine language, while remote exploits use interpreted language XSS attacks target servers, while remote … Read more

Which of the following might a hacker still be able to perform?

Correct Answer for the Question – Which of the following might a hacker still be able to perform? is given below A highly complex password policy has made it nearly impossible to crack account passwords. Which of the following might a hacker still be able to perform? Pass-the-hash attack ARP poisoning attack Birthday attack Brute force … Read more

Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises?

Correct Answer for the Question – Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises? is given below A bank uses a wireless network to transmit credit card purchases to a billing system.Which of the following would be MOST appropriate to protect … Read more