A) Download the configuration
B) Run a credentialed scan.
C) Conduct the assessmenet during downtime
D) Change the routing to bypass the router.
Correct Answer
verified
Multiple Choice
A) Retinal scan
B) Passphrase
C) Token fob
D) Security question
Correct Answer
verified
Multiple Choice
A) Web application firewall
B) DLP
C) Host-based firewall
D) UTM
E) Network-based firewall
Correct Answer
verified
Multiple Choice
A) Password cracker
B) Vulnerability scanner
C) DLP scanner
D) Fuzzer
Correct Answer
verified
Multiple Choice
A) put in place to mitigate a weakness in a user control.
B) deployed to supplement an existing control that is EOL.
C) relied on to address gaps in the existing control structure.
D) designed to specifically mitigate a risk.
Correct Answer
verified
Multiple Choice
A) Order of volatility
B) Chain of custody
C) Recovery procedure
D) Incident isolation
Correct Answer
verified
Multiple Choice
A) The company implements a captive portal
B) The thermostat is using the incorrect encryption algorithm
C) the WPA2 shared likely is incorrect
D) The company's DHCP server scope is full
Correct Answer
verified
Multiple Choice
A) SSH
B) SFTP
C) HTTPS
D) SNMP
Correct Answer
verified
Multiple Choice
A) Implement SAML so the company's services may accept assertions from the customers' authentication servers.
B) Provide customers with a constrained interface to manage only their users' accounts in the company's active directory server.
C) Provide a system for customers to replicate their users' passwords from their authentication service to the company's.
D) Use SOAP calls to support authentication between the company's product and the customers' authentication servers.
Correct Answer
verified
Multiple Choice
A) Nation state
B) Hacktivist
C) Insider
D) Competitor
Correct Answer
verified
Multiple Choice
A) IoT devices have built-in accounts that users rarely access.
B) IoT devices have less processing capabilities.
C) IoT devices are physically segmented from each other.
D) IoT devices have purpose-built applications.
Correct Answer
verified
Multiple Choice
A) Input validation
B) Proxy server
C) Stress testing
D) Encoding
Correct Answer
verified
Multiple Choice
A) Launch an investigation to identify the attacking host
B) Initiate the incident response plan
C) Review lessons learned captured in the process
D) Remove malware and restore the system to normal operation
Correct Answer
verified
Multiple Choice
A) Network tap
B) Honeypot
C) Aggregation
D) Port mirror
Correct Answer
verified
Multiple Choice
A) DES
B) AES
C) MD5
D) WEP
Correct Answer
verified
Multiple Choice
A) Review and update the firewall settings
B) Restrict the compromised user account
C) Disable all user accounts that are not logged in to for 180 days
D) Enable a login banner prohibiting unauthorized use
E) Perform an audit of all company user accounts
F) Create a honeypot to catch the hacker
Correct Answer
verified
Multiple Choice
A) An attacker is exfiltrating large amounts of proprietary company data.
B) Employees are playing multiplayer computer games.
C) A worm is attempting to spread to other hosts via SMB exploits.
D) Internal hosts have become members of a botnet.
Correct Answer
verified
Multiple Choice
A) RADIUS attribute
B) SAML tag
C) LDAP path
D) Shibboleth IdP
Correct Answer
verified
Multiple Choice
A) RADIUS
B) SSO
C) Transitive trust
D) OTP
Correct Answer
verified
Multiple Choice
A) intrusive testing
B) a buffer overflow
C) a race condition
D) active reconnaissance
Correct Answer
verified
Showing 421 - 440 of 1164
Related Exams