Podcast
Questions and Answers
Which of the following must be configured to provide authentication between the switch and the TACACS+ server?
Which of the following must be configured to provide authentication between the switch and the TACACS+ server?
- 802.1x
- Shared secret (correct)
- SNMPv3
- SSH
Which of the following is BEST suited to perform an audit of the login page of a newly developed web application to determine if default accounts have been disabled?
Which of the following is BEST suited to perform an audit of the login page of a newly developed web application to determine if default accounts have been disabled?
- Protocol analyzer
- Rainbow table
- Banner grabbing
- Password cracker (correct)
Which of the following is the color-coded table in the exhibit an example of?
Which of the following is the color-coded table in the exhibit an example of?
- Internal threat assessment
- Privacy impact assessment
- Qualitative risk assessment (correct)
- Supply chain assessment
Which of the following should be implemented to prevent DoS attacks in the future for the bank experiencing a DoS attack against an application designed to handle 500 IP-based sessions, where the perimeter router can only handle 1Gbps of traffic?
Which of the following should be implemented to prevent DoS attacks in the future for the bank experiencing a DoS attack against an application designed to handle 500 IP-based sessions, where the perimeter router can only handle 1Gbps of traffic?
Which of the following actions should a systems administrator take when configuring a new network switch for TACACS+ management and authentication?
Which of the following actions should a systems administrator take when configuring a new network switch for TACACS+ management and authentication?
Which of the following actions should a security administrator take to audit the login page of a newly developed web application to determine if default accounts have been disabled?
Which of the following actions should a security administrator take to audit the login page of a newly developed web application to determine if default accounts have been disabled?
Which of the following is the color-coded table in the exhibit used to represent?
Which of the following is the color-coded table in the exhibit used to represent?
What should be implemented to prevent future DoS attacks on the bank's application that can handle 500 IP-based sessions, when the perimeter router can only handle 1Gbps of traffic?
What should be implemented to prevent future DoS attacks on the bank's application that can handle 500 IP-based sessions, when the perimeter router can only handle 1Gbps of traffic?
Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?
Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?
Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?
Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?
Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?
Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?
Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?
Which of the following steps should the forensic analyst perform NEXT in the forensics process, given the scenario of following incident response best practices and compiling artifacts for the legal team?
Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?
Which of the following would BEST resolve the vulnerability identified in the audit report that could allow unauthorized personnel access to the facility and network?
Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?
Based on the observed network traffic behavior described, where the computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts, what is the MOST likely cause?
Which of the following is the BEST way to check if the digital certificate is valid?
Which of the following is the BEST way to check if the digital certificate is valid?
Which of the following is used to validate the integrity of data?
Which of the following is used to validate the integrity of data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following access management concepts is associated with file permissions?
Which of the following access management concepts is associated with file permissions?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which access management concept is associated with file permissions?
Which access management concept is associated with file permissions?
Which technique was used by the third-party penetration testing company to gain root access on the server?
Which technique was used by the third-party penetration testing company to gain root access on the server?
What did the tester do after gaining root access on the initial server?
What did the tester do after gaining root access on the initial server?
Based on the given information, which authentication type is being utilized?
Based on the given information, which authentication type is being utilized?
Which account type should the policy specify for service technicians from corporate partners?
Which account type should the policy specify for service technicians from corporate partners?
Which of the following are needed to ensure credentials are encrypted in transit when implementing a RADIUS server for Single Sign-On (SSO)?
Which of the following are needed to ensure credentials are encrypted in transit when implementing a RADIUS server for Single Sign-On (SSO)?
In which environment is the employee currently working, based on the given information?
In which environment is the employee currently working, based on the given information?
What is the term used to describe the situation when a vulnerability scan fails to identify an existing vulnerability?
What is the term used to describe the situation when a vulnerability scan fails to identify an existing vulnerability?
Which of the following is the primary goal of the account management policy mentioned in the text?
Which of the following is the primary goal of the account management policy mentioned in the text?
Which of the following security attributes is NOT mentioned as a parameter defined by the account management policy?
Which of the following security attributes is NOT mentioned as a parameter defined by the account management policy?
What is the purpose of the secure shell around software being developed by the employee?
What is the purpose of the secure shell around software being developed by the employee?
What is the immediate next step the technician should take after discovering a crypto-virus infection on a workstation with access to sensitive remote resources?
What is the immediate next step the technician should take after discovering a crypto-virus infection on a workstation with access to sensitive remote resources?
Which backup method would be the best for Joe, the backup administrator, to implement in order to reduce the restoration time of physical servers?
Which backup method would be the best for Joe, the backup administrator, to implement in order to reduce the restoration time of physical servers?
To comply with the new requirements mandating the use of AES encryption for the company's wireless configuration, which setting should the network technician configure?
To comply with the new requirements mandating the use of AES encryption for the company's wireless configuration, which setting should the network technician configure?
Which statement accurately differentiates ARP poisoning from a MAC spoofing attack?
Which statement accurately differentiates ARP poisoning from a MAC spoofing attack?
When downloading software for the organization's core switch, the network administrator is presented with checksum values. What is the primary purpose of checksums in this context?
When downloading software for the organization's core switch, the network administrator is presented with checksum values. What is the primary purpose of checksums in this context?
Which of the following best describes the difference between SaaS (Software as a Service) and IaaS (Infrastructure as a Service)?
Which of the following best describes the difference between SaaS (Software as a Service) and IaaS (Infrastructure as a Service)?
In the context of cloud computing models, what is the primary characteristic that differentiates a private cloud from a hybrid cloud?
In the context of cloud computing models, what is the primary characteristic that differentiates a private cloud from a hybrid cloud?
Which of the following is an accurate statement about MaaS (Mobility as a Service)?
Which of the following is an accurate statement about MaaS (Mobility as a Service)?
Which of the following is the MOST likely reason the company website is unavailable after the network administrator disables HTTP and implements SSL?
Which of the following is the MOST likely reason the company website is unavailable after the network administrator disables HTTP and implements SSL?
Which of the following access management concepts is associated with file permissions?
Which of the following access management concepts is associated with file permissions?
According to the follow-up action item from the lessons learned meeting, which of the following conditions would NOT allow authentication?
According to the follow-up action item from the lessons learned meeting, which of the following conditions would NOT allow authentication?
Which of the following is used to validate the integrity of data?
Which of the following is used to validate the integrity of data?
Which of the following statements is TRUE regarding the company website's login page?
Which of the following statements is TRUE regarding the company website's login page?
Which of the following is the MOST likely cause of the observed network traffic behavior where computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts?
Which of the following is the MOST likely cause of the observed network traffic behavior where computers in the IP Dst field start exhibiting the same behavior and making multiple outbound connection attempts?
Which of the following was MOST likely utilized to exfiltrate the proprietary data?
Which of the following was MOST likely utilized to exfiltrate the proprietary data?
Which of the following access management concepts is associated with file permissions?
Which of the following access management concepts is associated with file permissions?
Which of the following is the BEST way to check if the digital certificate is valid?
Which of the following is the BEST way to check if the digital certificate is valid?
Which of the following is used to validate the integrity of data?
Which of the following is used to validate the integrity of data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following access management concepts is associated with file permissions?
Which of the following access management concepts is associated with file permissions?
Which technique was used by the third-party penetration testing company to gain root access on the server?
Which technique was used by the third-party penetration testing company to gain root access on the server?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
Which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?
What did the tester do after gaining root access on the initial server?
What did the tester do after gaining root access on the initial server?
Which of the following access management concepts is associated with file permissions?
Which of the following access management concepts is associated with file permissions?
Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?
Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?
University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?
Which of the following is being described when a security professional develops and publishes a password policy specifically tailored to a company, and enforces the policy through technical means?
University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
University A offers an AAA-based SSO service that allows students to access all wireless and VPN services with the standard university credentials. University A wants to partner with University B to allow its students who are taking classes at University B to sign into both university's wireless network and VPN services with their home university credentials. Which of the following should be implemented to achieve the desired results?
The security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
The security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message?
What is the primary purpose of ARP poisoning?
What is the primary purpose of ARP poisoning?
Which of the following is a characteristic of a hybrid cloud model?
Which of the following is a characteristic of a hybrid cloud model?
What is the primary purpose of using checksums when downloading software for network devices?
What is the primary purpose of using checksums when downloading software for network devices?
Which of the following is the MOST effective countermeasure against a distributed denial-of-service (DDoS) attack?
Which of the following is the MOST effective countermeasure against a distributed denial-of-service (DDoS) attack?
What is the primary purpose of implementing RADIUS for Single Sign-On (SSO)?
What is the primary purpose of implementing RADIUS for Single Sign-On (SSO)?
Which of the following is the MOST effective way to determine if a web application has default accounts enabled?
Which of the following is the MOST effective way to determine if a web application has default accounts enabled?
What is the primary purpose of the secure shell (SSH) in the context of software development?
What is the primary purpose of the secure shell (SSH) in the context of software development?
Which of the following is the MOST effective way to mitigate the risk of a false negative during a vulnerability scan?
Which of the following is the MOST effective way to mitigate the risk of a false negative during a vulnerability scan?
Which two protocols should the security technician configure to meet the requirements of sending status reports and logging details to a central management console?
Which two protocols should the security technician configure to meet the requirements of sending status reports and logging details to a central management console?
Based on the observation that each malware binary has a different hash, which type of malware is most likely present in the enterprise network environment?
Based on the observation that each malware binary has a different hash, which type of malware is most likely present in the enterprise network environment?
Which combination of factors represents multifactor authentication?
Which combination of factors represents multifactor authentication?
Based on the HTTP POST request containing the string userid=bob' and 1='1&request=Submit
, which type of attack was attempted?
Based on the HTTP POST request containing the string userid=bob' and 1='1&request=Submit
, which type of attack was attempted?
Which type of control allows a security guard to perform a post-incident review?
Which type of control allows a security guard to perform a post-incident review?
Which security concern arises from the testing team's decision to use production data in the test system for stress testing?
Which security concern arises from the testing team's decision to use production data in the test system for stress testing?
Which of the following is a common technique used by polymorphic malware to evade detection?
Which of the following is a common technique used by polymorphic malware to evade detection?
In the context of network security, what is the primary purpose of using the Syslog protocol?
In the context of network security, what is the primary purpose of using the Syslog protocol?