Join the discussion
Question 1/532
A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?
Correct Answer: D
Add Comments
- Other Question (532q)
- Q1. A technician enables full disk encryption on a laptop that will be taken on a business tnp...
- Q2. An organization is having difficulty correlating events from its individual AV. EDR. DLP. ...
- Q3. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q4. Which of the following organizational policies are MOST likely to detect fraud that is bei...
- Q5. Joe. a security analyst, recently performed a network discovery to fully understand his or...
- Q6. A systems administrator needs to install the same X.509 certificate on multiple servers. W...
- Q7. An organization is developing a plan in the event of a complete loss of critical systems a...
- Q8. An organization has implemented a two-step verification process to protect user access to ...
- Q9. Which of the following incident response steps occurs before containment?...
- Q10. An amusement park is implementing a btomelnc system that validates customers' fingerpnnts ...
- Q11. An organization has been experiencing outages during holiday sales and needs to ensure ava...
- Q12. A network engineer at a company with a web server is building a new web environment with t...
- Q13. You received the output of a recent vulnerability assessment. Review the assessment and sc...
- Q14. Which of the following are the MOST likely vectors for the unauthorized or unintentional i...
- Q15. Whiich of the following Gieuster recovery tests ie the LEAST time coneuntng for tie easier...
- Q16. An analyst visits an internet forum looking for information about a tool. The analyst find...
- Q17. A security analyst is investigating multiple hosts that are communicating to external IP a...
- Q18. A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect...
- Q19. An analyst has determined that a server was not patched and an external actor exfiltrated ...
- Q20. Which of the following scenarios describes a possible business email compromise attack?...
- Q21. During an incident response, a security analyst observes the following log entry on the we...
- Q22. A security administrator needs to create a RAIS configuration that is focused on high read...
- Q23. Which of the following BEST describes data streams that are compiled through artificial in...
- Q24. A large financial services firm recently released information regarding a security bfeach ...
- Q25. A company reduced the area utilized in its datacenter by creating virtual networking throu...
- Q26. A security operations technician is searching the log named /vax/messages for any events t...
- Q27. While investigating a recent security incident, a security analyst decides to view all net...
- Q28. A company was compromised, and a security analyst discovered the attacker was able to get ...
- Q29. When planning to build a virtual environment, an administrator need to achieve the followi...
- Q30. A company recently upgraded its authentication infrastructure and now has more computing p...
- Q31. Administrators have allowed employee to access their company email from personal computers...
- Q32. A systems administrator set up an automated process that checks for vulnerabilities across...
- Q33. A security researcher has alerted an organization that its sensitive user data was found f...
- Q34. A security administrator suspects an employee has been emailing proprietary information to...
- Q35. A systems administrator needs to install a new wireless network for authenticated guest ac...
- Q36. A forensics investigator is examining a number of unauthorized payments that were reported...
- Q37. A company wants to build a new website to sell products online. The website wd I host a st...
- Q38. Per company security policy, IT staff members are required to have separate credentials to...
- Q39. An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the foll...
- Q40. A implementing a DLP solution In order to reslnct PHI documents which of the following sho...
- Q41. A security analyst receives a SIEM alert that someone logged in to the appadmin test accou...
- Q42. A user reports constant lag and performance issues with the wireless network when working ...
- Q43. A remote user recently took a two-week vacation abroad and brought along a corporate-owned...
- Q44. An incident has occurred in the production environment. Analyze the command outputs and id...
- Q45. Which of the following provides the BEST protection for sensitive information and data sto...
- Q46. A security team is engaging a third-party vendor to do a penetration test of a new proprie...
- Q47. A cybersecurity analyst reviews the log files from a web server end sees a series of files...
- Q48. A research company discovered that an unauthorized piece of software has been detected on ...
- Q49. A security administrator needs to create a RAIS configuration that is focused on high read...
- Q50. The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improv...
- Q51. A systems administrator needs to install a new wireless network for authenticated guest ac...
- Q52. A security analyst is investigation an incident that was first reported as an issue connec...
- Q53. An analyst Is generating a security report for the management team. Security guidelines re...
- Q54. An administrator is configuring a firewall rule set for a subnet to only access DHCP, web ...
- Q55. If a current private key is compromised, which of the following would ensure it cannot be ...
- Q56. As part of a company's ongoing SOC maturation process, the company wants to implement a me...
- Q57. An administrator is configuring a firewall rule set for a subnet to only access DHCP, web ...
- Q58. A security analyst receives an alert from the company's SIEM that anomalous activity is co...
- Q59. A network administrator has been alerted that web pages are experiencing long load times A...
- Q60. A security analyst needs to determine how an attacker was able to use User3 to gain a foot...
- Q61. You received the output of a recent vulnerability assessment. Review the assessment and sc...
- Q62. Which of the following would be indicative of a hidden audio file found inside of a piece ...
- Q63. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q64. A network engineer needs to create a plan for upgrading the wireless infrastructure in a l...
- Q65. A cybersecurity analyst reviews the log files from a web server and sees a series of files...
- Q66. Which of the following would cause a Chief information Security Officer the MOST concer re...
- Q67. DRAG DROP - A security engineer is setting up passwordless authentication for the first ti...
- Q68. Which of the following will provide the BEST physical security countermeasures to stop int...
- Q69. Which of the following environment utilizes dummy data and is MOST to be installed locally...
- Q70. Which of the following is required in order for an IDS and a WAF to be effective on HTTPS ...
- Q71. A security analyst was deploying a new website and found a connection attempting to authen...
- Q72. A user reports constant lag and performance issues with the wireless network when working ...
- Q73. A security engineer has enabled two-factor authentication on all workstations. Which of th...
- Q74. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q75. A large industrial system's smart generator monitors the system status and sends alerts to...
- Q76. A network administrator needs to build out a new datacenter, with a focus on resiliency an...
- Q77. A company recently experienced an inside attack using a corporate machine that resulted in...
- Q78. During an incident a company CIRT determine it is necessary to observe the continued netwo...
- Q79. Users at organization have been installing programs from the internet on their workstation...
- Q80. A security analyst is reviewing the output of a web server log and notices a particular ac...
- Q81. An analyst is generating a security report for the management team. Security guidelines re...
- Q82. A junior security analyst iss conducting an analysis after passwords were changed on multi...
- Q83. A security analyst must detenmine If elther SSH er Telnet ts being used to lng in bo serve...
- Q84. Given the following logs: (Exhibit) Which of the following BEST describes the type of atta...
- Q85. A security operations analyst is using the company's SIEM solution to correlate alerts. Wh...
- Q86. The chief compliance officer from a bank has approved a background check policy for all ne...
- Q87. A security analyst needs to recommend a solution that will allow current Active Directory ...
- Q88. Multiple business accounts were compromised a few days after a public website had its cred...
- Q89. A company recently experienced a major breach. An investigation concludes that customer cr...
- Q90. An enterprise has hired an outside security firm to conduct penetration testing on its net...
- Q91. Historically. a company has had issues with users plugging in personally owned removable m...
- Q92. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q93. The following are the logs of a successful attack. (Exhibit) Which of the following contro...
- Q94. Aconbgany uses a drone for precise perimeter and boundary monitoring. Which of the followi...
- Q95. A local coffee shop runs a small WiFi hot-spot for its customers that utilizes WPA2-PSK. T...
- Q96. You received the output of a recent vulnerability assessment. Review the assessment and sc...
- Q97. During a forensic investigation, a security analyst discovered that the following command ...
- Q98. Acritical file server is being upgraded and the systems administrator must determine which...
- Q99. Which of the following would a European company interested in implementing a technical, ha...
- Q100. A security engineer needs to enhance MFA access to sensitive areas in a building. A key ca...
- Q101. Which of the following is a difference between a DRP and a BCP?...
- Q102. A security manager for a retailer needs to reduce the scope of a project to comply with PC...
- Q103. An organization has been experiencing outages during holiday sales and needs to ensure ava...
- Q104. Which of the following is a policy that provides a greater depth of knowldge across an org...
- Q105. A user received an SMS on a mobile phone that asked for bank details. Which of the followi...
- Q106. Which Of the following will provide the best physical security countermeasures to Stop int...
- Q107. Which of the following describes the ability of code to target a hypervisor from inside...
- Q108. Which of the following is an example of transference of risk?...
- Q109. A company's Chief Information Office (CIO) is meeting with the Chief Information Security ...
- Q110. The board of doctors at a company contracted with an insurance firm to limit the organizat...
- Q111. A client sent several inquiries to a project manager about the delinquent delivery status ...
- Q112. A company is enhancing the security of the wireless network and needs to ensure only emplo...
- Q113. An organization's RPO for a critical system is two hours. The system is used Monday throug...
- Q114. A developer is building a new portal to deliver single-pane-of-glass management capabiliti...
- Q115. An organization is building backup server rooms in geographically diverse locations The Ch...
- Q116. A systems administrator needs to install a new wireless network for authenticated guest ac...
- Q117. A network engineer receives a call regarding multiple LAN-connected devices that are on th...
- Q118. An IT manager is estimating the mobile device budget for the upcoming year. Over the last ...
- Q119. A malware attack has corrupted 30TB of company data across all file servers A systems admi...
- Q120. A network analyst is investigating compromised corporate information. The analyst leads to...
- Q121. A user reports constant lag and performance issues with the wireless network when working ...
- Q122. An organization is concerned about intellectual property theft by employee who leave the o...
- Q123. Which of the following is an example of risk avoidance?...
- Q124. A user reports constant lag and performance issues with the wireless network when working ...
- Q125. A company processes highly sensitive data and senior management wants to protect the sensi...
- Q126. An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the foll...
- Q127. An attack relies on an end user visiting a website the end user would typically visit, how...
- Q128. A global company is experiencing unauthorized logging due to credential theft and account ...
- Q129. Which of the following are requirements that must be configured for PCI DSS compliance? (S...
- Q130. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q131. During an incident, an EDR system detects an increase in the number of encrypted outbound ...
- Q132. A company is enhancing the security of the wireless network and needs to ensure only emplo...
- Q133. A security engineer is concerned the strategy for detection on endpoints is too heavily de...
- Q134. Which of the following would be the BEST way to analyze diskless malware that has infected...
- Q135. Which of the following would most likely include language prohibiting end users from acces...
- Q136. A network-connected magnetic resonance imaging (MRI) scanner at a hospital is controlled a...
- Q137. Moving laterally within a network once an initial exploit is used to gain persistent acces...
- Q138. The Chief Information Security Officer (CISO) has requested that a third-party vendor prov...
- Q139. Leveraging the information supplied below, complete the CSR for the server to set up TLS (...
- Q140. During an incident response, a security analyst observes the following log entry on the we...
- Q141. A corporate security team needs to secure the wireless perimeter of its physical facilitie...
- Q142. A cybersecurity analyst reviews the log files from a web server and sees a series of files...
- Q143. As part of the building process for a web application, the compliance team requires that a...
- Q144. An organization has hired a security analyst to perform a penetration test. The analyst ca...
- Q145. A systems integrator is installing a new access control system for a building. The new sys...
- Q146. An organization is repairing damage after an incident. Which Of the following controls is ...
- Q147. A dynamic application vulnerability scan identified code injection could be performed usin...
- Q148. An organization discovered a disgruntled employee exfiltrated a large amount of PII data b...
- Q149. A security administrator needs to provide secure access to internal networks for external ...
- Q150. A company wants the ability to restrict web access and monitor the websites that employees...
- Q151. An annual information security assessment has revealed that several OS-level configuration...
- Q152. A network administrator needs to build out a new datacenter, with a focus on resiliency an...
- Q153. An organization discovered a disgruntled employee exfiltrated a large amount of PII data b...
- Q154. A security analyst is investigation an incident that was first reported as an issue connec...
- Q155. A security analyst has been asked to investigate a situation after the SOC started to rece...
- Q156. The IT department at a university is concerned about professors placing servers on the uni...
- Q157. The security administrator has installed a new firewall which implements an implicit DENY ...
- Q158. A security analyst wants to fingerpnnt a web server Which of the following tools will the ...
- Q159. A security researcher is using an adversary's infrastructure and TTPs and creating a named...
- Q160. The Chief Information Security Officer directed a nsk reduction in shadow IT and created a...
- Q161. When planning to build a virtual environment, an administrator need to achieve the followi...
- Q162. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q163. A security researcher has alerted an organization that its sensitive user data was found f...
- Q164. A security analyst has been asked by the Chief Information Security Officer to: * develop...
- Q165. An incident, which is affecting dozens of systems, involves malware that reaches out to an...
- Q166. A customer called a company's security team to report that all invoices the customer has r...
- Q167. A security analyst needs to find real-time data on the latest malware and IoCs. Which of t...
- Q168. A user enters a username and a password at the login screen for a web portal. A few second...
- Q169. Which of the following can be used to calculate the total loss expected per year due to a ...
- Q170. A user reports falling for a phishing email to an analyst. Which of the following system l...
- Q171. A new security engineer has started hardening systems. One of the hardening techniques the...
- Q172. The security administrator has installed a new firewall which implements an implicit DENY ...
- Q173. A user reports trouble using a corporate laptop. The laptop freezes and responds slowly wh...
- Q174. Leveraging the information supplied below, complete the CSR for the server to set up TLS (...
- Q175. A security analyst reviews web server logs and finds the following string gallerys?file-. ...
- Q176. The following is an administrative control that would be MOST effective to reduce the occu...
- Q177. A security analyst is investigating suspicious traffic on the web server located at IP add...
- Q178. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q179. Which of the following terms describes a broad range of information that is sensitive to a...
- Q180. A company's public-facing website, https://www.organization.com, has an IP address of 166....
- Q181. Multiple business accounts were compromised a few days after a public website had its cred...
- Q182. An analyst visits an internet forum looking for information about a tool. The analyst find...
- Q183. A researcher has been analyzing large data sets for the last ten months. The researcher wo...
- Q184. Against the recommendation of the IT security analyst, a company set all user passwords on...
- Q185. A cybersecurity analyst reviews the log files from a web server and sees a series of files...
- Q186. As part of the building process for a web application, the compliance team requires that a...
- Q187. A systems administrator needs to install a new wireless network for authenticated guest ac...
- Q188. Which of the following security concepts should an e-commerce organization apply for prote...
- Q189. While reviewing an alert that shows a malicious request on one web application, a cybersec...
- Q190. A healthcare company is revamping its IT strategy in light of recent regulations. The comp...
- Q191. Due to unexpected circumstances, an IT company must vacate its main office, forcing all op...
- Q192. An auditor is performing an assessment of a security appliance with an embedded OS that wa...
- Q193. A company is under investigation for possible fraud. As part of the investigation. the aut...
- Q194. Which of the following environments typically hosts the current version configurations and...
- Q195. A company a "right to forgotten" request To legally comply, the company must remove data r...
- Q196. A user's login credentials were recently compromised During the investigation, the securit...
- Q197. Which of the following describes where an attacker can purchase DDoS or ransomware service...
- Q198. An organization maintains several environments in which patches are developed and tested b...
- Q199. A company discovered that terabytes of data have been exfiltrated over the past year after...
- Q200. A user reports trouble using a corporate laptop. The laptop freezes and responds slowly wh...
- Q201. Which of the following controls is used to make an organization initially aware of a data ...
- Q202. Several universities are participating m a collaborative research project and need to shar...
- Q203. A security monitoring company offers a service that alerts its customers if their credit c...
- Q204. A bank detects fraudulent activity on user's account. The user confirms transactions compl...
- Q205. An analyst needs to identify the applications a user was running and the files that were o...
- Q206. A company is moving to new location. The systems administrator has provided the following ...
- Q207. Which of the following types of attacks is specific to the individual it targets?...
- Q208. A security architect is required to deploy to conference rooms some workstations that will...
- Q209. A nationwide company is experiencing unauthorized logins at all hours of the day. The logi...
- Q210. A securtly analyst wants to reference a standard to develop a risk management program. Whi...
- Q211. A manager for the development team is concerned about reports showing a common set of vuln...
- Q212. An organization routes all of its traffic through a VPN Most users are remote and connect ...
- Q213. Which of the following can be used by an authentication application to validate a user's c...
- Q214. A new plug-and-play storage device was installed on a PC in the corporate environment. Whi...
- Q215. A company is implementing BYOD and wants to ensure all users have access to the same cloud...
- Q216. A developer is building a new portal to deliver single-pane-of-glass management capabiliti...
- Q217. A security assessment found that several embedded systems are running unsecure protocols. ...
- Q218. A customer called a company's security team to report that all invoices the customer has r...
- Q219. A security analyst Is reviewing the following output from a system: (Exhibit) Which of the...
- Q220. During a recent penetration test, the tester discovers large amounts of data were exfiltra...
- Q221. Security engineers are working on digital certificate management with the top priority of ...
- Q222. A network analyst is investigating compromised corporate information. The analyst leads to...
- Q223. A consultant is configuring a vulnerability scanner for a large, global organization in mu...
- Q224. A company recently implemented a patch management policy; however, vulnerability scanners ...
- Q225. A company just developed a new web application for a government agency. The application mu...
- Q226. A security analyst is investigating some users who are being redirected to a fake website ...
- Q227. A security engineer is installing a WAF to protect the company's website from malicious we...
- Q228. A security analyst is hardening a network infrastructure. The analyst is given the followi...
- Q229. A store receives reports that shoppers' credit card information is being stolen. Upon furt...
- Q230. A security assessment determines DES and 3DES at still being used on recently deployed pro...
- Q231. Which of the following incident response phases should the proper collection of the detect...
- Q232. A security analyst is using OSINT to gather information to verity whether company data is ...
- Q233. A systems administrator wants to disable the use of usernames and passwords for SSH authen...
- Q234. A network administrator has been alerted that web pages are experiencing long load times. ...
- Q235. A security analyst is investigating an incident to determine what an attacker was able to ...
- Q236. A junior security analyst is conducting an analysis after passwords were changed on multip...
- Q237. An IT security manager requests a report on company information that is publicly available...
- Q238. Which of the following types of attacks is being attempted and how can it be mitigated? (E...
- Q239. An organization is concerned about hackers potentially entering a facility and plugging in...
- Q240. After a phishing scam fora user's credentials, the red team was able to craft payload to d...
- Q241. A grocery store is expressing security and reliability concerns regarding the on-site back...
- Q242. Which of the following BEST describes the team that acts as a referee during a penetration...
- Q243. A company wants to simplify the certificate management process. The company has a single d...
- Q244. During an incident response, a security analyst observes the following log entry on the we...
- Q245. Which of the following are requirements that must be configured for PCI DSS compliance? (S...
- Q246. Which of the following explains why RTO is included in a BIA?...
- Q247. An engineer wants to inspect traffic to a cluster of web servers in a cloud environment Wh...
- Q248. The spread of misinformation surrounding the outbreak of a novel virus on election day led...
- Q249. A company has decided to move its operations to the cloud. It wants to utilize technology ...
- Q250. Which of the following should be put in place when negotiating with a new vendor about the...
- Q251. A Chief Information Security Officer (CISO) is evaluating the dangers involved in deployin...
- Q252. A financial institution would like to store its customer data in a cloud but still allow t...
- Q253. Which of the following describes the ability of code to target a hypervisor from inside...
- Q254. The Chief information Security Officer wants to prevent exfilitration of sensitive informa...
- Q255. A company recently added a DR site and is redesigning the network. Users at the DR site ar...
- Q256. A penetration tester was able to compromise an internal server and is now trying to pivot ...
- Q257. Which of the following Is the BEST reason to maintain a functional and effective asset man...
- Q258. A company wants to modify its current backup strategy to modify its current backup strateg...
- Q259. Given the following logs: (Exhibit) Which of the following BEST describes the type of atta...
- Q260. After segmenting the network, the network manager wants to control the traffic between the...
- Q261. A symmetric encryption algorithm is BEST suited for:...
- Q262. he SIEM at an organization has detected suspicious traffic coming from a workstation in it...
- Q263. A company purchased cyber insurance to address items listed on the risk register. Which of...
- Q264. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q265. A security assessment determines DES and 3DES at still being used on recently deployed pro...
- Q266. A security analyst reviews the datacenter access logs for a fingerprint scanner and notice...
- Q267. A company uses wireless tor all laptops and keeps a very detailed record of its assets, al...
- Q268. Developers are about to release a financial application, but the number of fields on the f...
- Q269. Business partners are working on a secunty mechanism lo validate transactions securely. Th...
- Q270. Which of the following can reduce vulnerabilities by avoiding code reuse?...
- Q271. A cyber security administrator is using iptables as an enterprise firewall. The administra...
- Q272. A security administrator installed a new web server. The administrator did this to increas...
- Q273. Which of the following disaster recovery tests is the LEAST time consuming for the disaste...
- Q274. A security analyst needs to determine how an attacker was able to use User3 to gain a foot...
- Q275. A user reports constant lag and performance issues with the wireless network when working ...
- Q276. A network administrator is setting up wireless access points in all the conference rooms a...
- Q277. During an incident response process involving a laptop, a host was identified as the entry...
- Q278. A security analyst has received several reports of an issue on an internal web application...
- Q279. An organization has expanded its operations by opening a remote office. The new office is ...
- Q280. Multiple beaconing activities to a malicious domain have been observed. The malicious doma...
- Q281. Which of the following describes the exploitation of an interactive process to gain access...
- Q282. A network administrator has been alerted that web pages are experiencing long load times. ...
- Q283. A security analyst has been tasked with creating a new WiFi network for the company. The r...
- Q284. Following a prolonged datacenter outage that affected web-based sales, a company has decid...
- Q285. Which of the following would MOST likely support the integrity of a voting machine?...
- Q286. A security architect is implementing a new email architecture for a company. Due to securi...
- Q287. A security administrator checks the table of a network switch, which shows the following o...
- Q288. A Chief Information Officer is concerned about employees using company-issued laptops to s...
- Q289. A security analyst is reviewing information regarding recent vulnerabilities. Which of the...
- Q290. Drag and Drop Question Leveraging the information supplied below, complete the CSR for the...
- Q291. A security analyst is investigating an incident to determine what an attacker was able to ...
- Q292. The application development teams have been asked to answer the following questions: * Doe...
- Q293. A security engineer needs to create a network segment that can be used for servers thal re...
- Q294. A securily analysl has receved several reporls of an issue on an inlemal web application. ...
- Q295. A network engineer is troubleshooting wireless network connectivity issues that were repor...
- Q296. A security analyst is reviewing the following attack log output: (Exhibit) Which of the fo...
- Q297. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q298. A security analyst is reviewing application logs to determine the source of a breach and l...
- Q299. A security engineer obtained the following output from a threat intelligence source that r...
- Q300. A company recently experienced an attack during which its main website was directed to the...
- Q301. A company recently set up an e-commerce portal to sell its product online. The company wan...
- Q302. A company is focused on reducing risks from removable media threats. Due to certain primar...
- Q303. A security analyst is evaluating the risks of authorizing multiple security solutions to c...
- Q304. A security analyst receives an alert from trie company's SIEM that anomalous activity is c...
- Q305. A new vulnerability in the SMB protocol on the Windows systems was recently discovered, bu...
- Q306. A customer called a company's security team to report that all invoices the customer has r...
- Q307. A company is implementing a new SIEM to log and send alerts whenever malicious activity is...
- Q308. An organization's Chief Information Security Officer is creating a position that will be r...
- Q309. A COMPANY HAS DESCOVERED UNA mans DEVICE ARE USING ITS WIFI NETWORK, AND IT WANTS TO HARDE...
- Q310. A company recently implemented a patch management policy; however, vulnerability scanners ...
- Q311. A backdoor was detected on the containerized application environment. The investigation de...
- Q312. While reviewing pcap data, a network security analyst is able to locate plaintext username...
- Q313. An organization needs to implement more stringent controls over administrator/root credent...
- Q314. A newly purchased corporate WAP needs to be configured in the MOST secure manner possible....
- Q315. A securily analysl has receved several reporls of an issue on an inlemal web application. ...
- Q316. Which of the following statements BEST describes zero-day exploits'?...
- Q317. A security manager runs Nessus scans of the network after every maintenance vandow Which o...
- Q318. A company recently decided to allow its employees to use their personally owned devices fo...
- Q319. A security researcher is using an adversary's infrastructure and TTPs and creating a named...
- Q320. Which of the following is a solution that can be used to stop a disgruntled employee from ...
- Q321. An attacker has successfully exfiltrated several non-salted password hashes from an online...
- Q322. Which of the following would MOST likely be identified by a credentialed scan but would be...
- Q323. A company recently added a DR site and is redesigning the network. Users at the DR site ar...
- Q324. An employee's laptop was stolen last month. This morning, the was returned by the A cyberr...
- Q325. Security analyst must enforce policies to harden an MOM infrastructure. The requirements a...
- Q326. A company is switching to a remote work model for all employees. All company and employee ...
- Q327. A public relations team will be taking a group of guests on a tour through the facility of...
- Q328. Which of the following control types is focused primarily on reducing risk before an incid...
- Q329. Which of the following often operates in a client-server architecture to act as a service ...
- Q330. While researching a data exfiltration event, the security team discovers that a large amou...
- Q331. The compliance team requires an annual recertification of privileged and non-privileged us...
- Q332. A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately p...
- Q333. Several employees have noticed other bystanders can clearly observe a terminal where passc...
- Q334. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q335. A financial nstitution wauid like to stare its customer data in a coud but still allaw the...
- Q336. An organization relies on third-party video conferencing to conduct daily business. Recent...
- Q337. An information security manager for an organization is completing a PCI DSS self-assessmen...
- Q338. A security engineer is hardening existing solutions to reduce application vulnerabilities....
- Q339. A company recently experienced an attack in which a malicious actor was able to exfiltrate...
- Q340. An organization's RPO for a critical system is two hours. The system is used Monday throug...
- Q341. An organization has various applications that contain sensitive data hosted in the cloud. ...
- Q342. As part of the lessons-learned phase, the SOC is tasked with building methods to detect if...
- Q343. Which ol the following is required in order (or an IDS and a WAF to be effective on HTTPS ...
- Q344. An organization discovered files with proprietary financial data have been deleted. The fi...
- Q345. Which of the following roles is responsible for defining the protection type and Classific...
- Q346. A security analyst is investigating a report from a penetration test. During the penetrati...
- Q347. An organization recently released a software assurance policy that requires developers to ...
- Q348. A security analyst is reviewing the output of a web server log and notices a particular ac...
- Q349. A security analyst is using OSINT to gather information to verify whether company data is ...
- Q350. A business is looking for a cloud service provider that offers a la carte services, includ...
- Q351. A university with remote campuses, which all use different service providers, loses Intern...
- Q352. A startup company is using multiple SaaS and IaaS platform to stand up a corporate infrast...
- Q353. A security engineer is concerned about using an agent on devices that relies completely on...
- Q354. A security incident has been resolved Which of the following BEST describes the importance...
- Q355. A security analyst receives a SIEM alert that someone logged in to the appadmin test accou...
- Q356. Which of the following will MOST likely cause machine learning and Al-enabled systems to o...
- Q357. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q358. A cloud service provider has created an environment where customers can connect existing l...
- Q359. A company recently decided to allow its employees to use their personally owned devices fo...
- Q360. A major clothing company recently lost a large amount of proprietary information The secur...
- Q361. Which of the following is assured when a user signs an email using a private key?...
- Q362. A financial institution would like to store its customer data in the cloud but still allow...
- Q363. A company recently transitioned to a strictly BYOD culture due to the cost of replacing lo...
- Q364. A security engineer updated an application on company workstations. The application was ru...
- Q365. A SOC is currently being outsourced. Which of the following is being used?...
- Q366. A systems administrator is required to enforce MFA for corporate email account access, rel...
- Q367. During a security assessment, a security finds a file with overly permissive permissions. ...
- Q368. A company has installed badge readers for building access but is finding unau-thorized ind...
- Q369. An organization wants to enable built-in FDE on all laptops Which of the following should ...
- Q370. A retail executive recently accepted a job with a major competitor. The following week, a ...
- Q371. A security analyst sees the following log output while reviewing web logs: (Exhibit) Which...
- Q372. The security administrator has installed a new firewall which implements an implicit DENY ...
- Q373. After a phishing scam fora user's credentials, the red team was able to craft payload to d...
- Q374. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q375. A user downloaded an extension for a browser, and the uses device later became infected. T...
- Q376. You are security administrator investigating a potential infection on a network. Click on ...
- Q377. An organization just experienced a major cyberattack modem. The attack was well coordinate...
- Q378. A security analyst is investigating a phishing email that contains a malicious document di...
- Q379. A Chief Security Officer (CSO) is concerned about the volume and integrity of sensitive in...
- Q380. An organization decided not to put controls in place because of the high cost of implement...
- Q381. The Chief Technology Officer of a local college would like visitors to utilize the school'...
- Q382. A security analyst is responding to an alert from the SIEM. The alert states that malware ...
- Q383. Which of the following BEST describes a social-engineering attack that relies on an execut...
- Q384. During a recent cybersecurity audit, the auditors pointed out various types of vulnerabili...
- Q385. A security administrator examines the ARP table of an access switch and sees the following...
- Q386. A forensics investigator is examining a number of unauthorized payments that were reported...
- Q387. A security analyst is reviewing the following attack log output: (Exhibit) Which of the fo...
- Q388. The facilities supervisor for a government agency is concerned about unauthorized access t...
- Q389. Which of the following types of attacks is being attempted and how can it be mitigated? (E...
- Q390. Law enforcement officials sent a company a notification that states electronically stored ...
- Q391. A security administrator is seeking a solution to prevent unauthorized access to the inter...
- Q392. A cybersecurity administrator is using iptables as an enterprise firewall. The administrat...
- Q393. A security analyst is using OSINT to gather information to verify whether company data is ...
- Q394. Which of the following authentication methods is considered to be the LEAST secure?...
- Q395. A company is experiencing an increasing number of systems that are locking up on Windows s...
- Q396. Which of the following threat actors is MOST likely to be motivated by ideology?...
- Q397. A company suspects that some corporate accounts were compromised. The number of suspicious...
- Q398. An organization would like to remediate the risk associated with its cloud service provide...
- Q399. Leveraging the information supplied below, complete the CSR for the server to set up TLS (...
- Q400. An analyst visits an internet forum looking for information about a tool. The analyst find...
- Q401. A security analyst is running a vulnerability scan to check for missing patches during a s...
- Q402. Which of the following would be indicative of a hidden audio file found inside of a piece ...
- Q403. Aglobal pandemic is forcing a private organization to close some business units and reduce...
- Q404. A security analyst has identified malv/are spreading through the corporate network and has...
- Q405. An organization hired a consultant to assist with an active attack, and the consultant was...
- Q406. A security analyst discovers that one of the web APIs is being abused by an unknown third ...
- Q407. While investigating a data leakage incident, a security analyst reviews access control to ...
- Q408. Which of the following are common VoIP-associated vulnerabilities? (Select TWO)....
- Q409. A financial institution would like to stare is customer data a could but still allow the d...
- Q410. A security engineer is installing a WAF to protect the company's website from malicious we...
- Q411. A security analyst is investigation an incident that was first reported as an issue connec...
- Q412. A security engineer is installing a WAF to protect the company's website from malicious we...
- Q413. A developer is concerned about people downloading fake malware-infected replicas of a popu...
- Q414. A small business just recovered from a ransomware attack against its file servers by purch...
- Q415. A security analyst needs to generate a server certificate to be used for 802.1X and secure...
- Q416. A financial organization has adopted a new secure, encrypted document-sharing application ...
- Q417. A security analyst is investigating network issues between a workstation and a company ser...
- Q418. Which of the following policies would help an organization identify and mitigate potential...
- Q419. An upcoming project focuses on secure communications and trust between external parties. W...
- Q420. A security administrator examines the ARP table of an access switch and sees the following...
- Q421. A company is concerned about individuals dnvmg a car into the building to gam access Which...
- Q422. A security analyst is assisting a team of developers with best practices for coding. The s...
- Q423. A junior security analyst iss conducting an analysis after passwords were changed on multi...
- Q424. A company uses specially configured workstations tor any work that requires administrator ...
- Q425. A junior security analyst is reviewing web server logs and identifies the following patter...
- Q426. The security administrator has installed a new firewall which implements an implicit DENY ...
- Q427. A security administrator checks the table of a network switch, which shows the following o...
- Q428. The management team has requested that the security team implement 802.1X into the existin...
- Q429. An enterprise has hired an outside security firm to conduct penetration testing on its net...
- Q430. A security analyst is investigation an incident that was first reported as an issue connec...
- Q431. A security analyst was called to Investigate a file received directly from a hardware manu...
- Q432. The SOC for a large MSSP in a meeting to discuss the lessons learned from a recent inciden...
- Q433. A large retail store's network was breached recently. and this news was made public. The S...
- Q434. Hotspot Question The security administration has installed a new firewall which implements...
- Q435. A company is developing a business continuity strategy and needs to determine how many sta...
- Q436. During an investigation, a security manager receives notification from local authorities m...
- Q437. A Chief Security Officer (CSO) was notified that a customer was able to access confidentia...
- Q438. Developers are writing code and merging it into shared repositories several times a day, w...
- Q439. Which of the following is an example of risk avoidance?...
- Q440. A company has been experiencing very brief power outages from its utility company over the...
- Q441. Which of the following would BEST provide a systems administrator with the ability to more...
- Q442. During an incident response, a security analyst observes the following log entry on the we...
- Q443. An organization wants to participate in threat intelligence information sharing with peer ...
- Q444. A Chief Information Security Officer (CISO) needs to create a policy set that meets intern...
- Q445. A security administrator has noticed unusual activity occurring between different global i...
- Q446. An organization recently recovered from a data breach. During the root cause analysis, the...
- Q447. An attacker is attempting to exploit users by creating a fake website with the URL users. ...
- Q448. While reviewing the wireless router, the systems administrator of a small business determi...
- Q449. A university is opening a facility in a location where there is an elevated risk of theft ...
- Q450. Which of the following is the correct order of volatility from most to least volatile?...
- Q451. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q452. A local coffee shop runs a small WiFi hot-spot for its customers that utilizes WPA2-PSK. T...
- Q453. After a phishing scam for 9 user's credentals, the red team was able to craft a payload to...
- Q454. A security analyst is evaluating solutions to deploy an additional layer of protection for...
- Q455. A security administrator recently used an internal CA to issue a certificate to a public a...
- Q456. A hospital's administration is concerned about a potential loss of patient data that is st...
- Q457. Which of the following should a Chief Information Security Officer consider using to take ...
- Q458. Which of the following cloud models provides clients with servers, storage, and networks b...
- Q459. A security analyst is reviewing the vulnerability scan report for a web server following a...
- Q460. The following are the logs of a successful attack. (Exhibit) Which of the following contro...
- Q461. Which of the following identifies the point in time when an organization will recover data...
- Q462. An engineer needs to deploy a security measure to identify and prevent data tampering with...
- Q463. Which of the following is the FIRST environment in which proper, secure coding should be p...
- Q464. Which of the following BEST describes when an organization utilizes a ready-to-use applica...
- Q465. The website http://companywebsite.com requires users to provide personal Information, Incl...
- Q466. A software company is analyzing a process that detects software vulnerabilities at the ear...
- Q467. While reviewing pcap data, a network security analyst is able to locate plaintext username...
- Q468. A security engineer needs to select a primary authentication source for use with a client ...
- Q469. An analyst is reviewing logs associated with an attack. The logs indicate an attacker down...
- Q470. A security engineer needs to recommend a solution to defend against malicious actors misus...
- Q471. A company is required to continue using legacy software to support a critical service. Whi...
- Q472. A junior security analyst is reviewing web server logs and identifies the following patter...
- Q473. A retail company that is launching a new website to showcase the company's product line an...
- Q474. An employee opens a web browser and types a URL into the address bar. Instead of reaching ...
- Q475. Which of the following utilize a subset of real data and are MOST likely to be used to ass...
- Q476. A network engineer notices the VPN concentrator overloaded and crashes on days when there ...
- Q477. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q478. A cloud service provider has created an environment where customers can connect existing l...
- Q479. After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by ex...
- Q480. A security administrator needs to block a TCP connection using the corporate firewall, Bec...
- Q481. A penetration tester was able to compromise a host using previously captured network traff...
- Q482. A company ts required to continue using legacy softveare to support a critical serwce. Whe...
- Q483. An organization's Chief Security Officer (CSO) wants to validate the business's involvemen...
- Q484. As part of a company's ongoing SOC maturation process, the company wants to implement a me...
- Q485. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q486. A technician enables full disk encryption on a laptop that will be taken on a business tri...
- Q487. A company is implementing a new SIEM to log and send alerts whenever malicious activity is...
- Q488. During an incident response, a security analyst observes the following log entry on the we...
- Q489. Which of the following is the MOST secure but LEAST expensive data destruction method for ...
- Q490. Which of the following BEST describes data streams that are compiled through artificial in...
- Q491. After a recent security incident, a security analyst discovered that unnecessary ports wer...
- Q492. Select the appropriate attack and remediation from each drop-down list to label the corres...
- Q493. A newly purchased corporate WAP needs to be configured in the MOST secure manner possible....
- Q494. A customer called a company's security team to report that all invoices the customer has r...
- Q495. A large financial services firm recently released information regarding a security bfeach ...
- Q496. An engineer recently deployed a group of 100 web servers in a cloud environment. Per the s...
- Q497. A customer service representative reported an unusual text message that was sent to the he...
- Q498. After segmenting the network, the network manager wants to control the traffic between the...
- Q499. An organization would like to remediate the risk associated with its cloud service provide...
- Q500. A software developer needs to perform code-execution testing, black-box testing, and non-f...
- Q501. Which of the following environments would MOST likely be used to assess the execution of c...
- Q502. After a hardware incident, an unplanned emergency maintenance activity was conducted to re...
- Q503. Which of the following identifies the point in time when an organization will recover data...
- Q504. During a forensic investigation, a security analyst discovered that the following command ...
- Q505. Which of the following tools is effective in preventing a user from accessing unauthorized...
- Q506. Given the following logs: (Exhibit) Which of the following BEST describes the type of atta...
- Q507. A small business just recovered from a ransomware attack against its file servers by purch...
- Q508. A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious w...
- Q509. A security engineer is setting up passwordless authentication for the first time. INSTRUCT...
- Q510. While researching a data exfiltration event, the security team discovers that a large amou...
- Q511. A security engineer was assigned to implement a solution to prevent attackers from gaining...
- Q512. Which of the following will MOST likely cause machine learning and Al-enabled systems to o...
- Q513. A security auditor is reviewing vulnerability scan data provided by an internal security t...
- Q514. A security analyst has been asked to investigate a situation after the SOC started to rece...
- Q515. A software company is analyzing a process that detects software vulnerabilities at the ear...
- Q516. Which of the following environments minimizes end-user disruption and is MOST likely to be...
- Q517. Which of the following is the BEST example of a cost-effective physical control to enforce...
- Q518. A security operations center wants to implement a solution that can execute files to test ...
- Q519. During an incident response, an analyst applied rules to all inbound traffic on the border...
- Q520. Which of the following security design features can an development team to analyze the del...
- Q521. A security investigation revealed mat malicious software was installed on a server using a...
- Q522. A grocery store is expressing security and reliability concerns regarding the on-site back...
- Q523. Company engineers regularly participate in a public Internet forum with other engineers th...
- Q524. A security analyst is concerned about traffic initiated to the dark web from the corporate...
- Q525. A security analyst has been reading about a newly discovered cyber attack from a known thr...
- Q526. A penetration tester is fuzzing an application to identify where the EIP of the stack is l...
- Q527. ihic ofthe lowing iste BEST resnon to meitsin efrciona ani SSUES Rane ETS or cricai?...
- Q528. An organization has implemented a two-step verification process to protect user access to ...
- Q529. A systems analyst determines the source of a high number of connections to a web server th...
- Q530. A company wants to improve end users experiences when they tog in to a trusted partner web...
- Q531. In a phishing attack, the perpetrator is pretending to be someone in a position of power i...
- Q532. A network engineer receives a call regarding multiple LAN-connected devices that are on th...
