Which of the following is the MOST likely cause?
Due to a policy change, a few of a customer’s application VMs have been migrated to synchronously replicated storage. The customer now reports that performance is lower. The systems administrator checks the resource usage and discovers CPU utilization is at 60% and available memory is at 30%. Which of the following is the MOST likely […]
Which of the following should the administrator troubleshoot FIRST?
A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST? A. The network environment B. Container resources C. Client devices D. Server resources
Which of the following is the MOST likely reason for not sending all the emails?
A marketing team is using a SaaS-based service to send emails to large groups of potential customers. The internally managed CRM system is configured to generate a list of target customers automatically on a weekly basis, and then use that list to send emails to each customer as part of a marketing campaign. Last week, […]
Which of the following testing techniques would be BEST to use?
A DevOps administrator is automating an existing software development workflow. The administrator wants to ensure that prior to any new code going into production, tests confirm the new code does not negatively impact existing automation activities. Which of the following testing techniques would be BEST to use? A. Usability testing B. Regression testing C. Vulnerability […]
Which of the following BEST describes this attack?
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider’s environment that do not belong to the company. Which of the following BEST describes this […]
Which of the following should the company implement?
A company wants to check its infrastructure and application for security issues regularly. Which of the following should the company implement? A. Performance testing B. Penetration testing C. Vulnerability testing D. Regression testing Reference: https://pure.security/services/technical-assurance/external-penetration-testing/
Which of the following can the analyst conclude?
A security analyst is reviewing packet captures from a system that was compromised. The system was already isolated from the network, but it did have network access for a few hours after being compromised. When viewing the capture in a packet analyzer, the analyst sees the following: Which of the following can the analyst conclude? […]
As part of the management response phase of the audit, which of the following would BEST demonstrate senior ma
An audit has revealed an organization is utilizing a large number of servers that are running unsupported operating systems. As part of the management response phase of the audit, which of the following would BEST demonstrate senior management is appropriately aware of and addressing the issue? A. Copies of prior audits that did not identify […]
Which of the following would BEST satisfy the objectives defined by the compliance officer? (Choose two.)
A compliance officer of a large organization has reviewed the firm’s vendor management program but has discovered there are no controls defined to evaluate third-party risk or hardware source authenticity. The compliance officer wants to gain some level of assurance on a recurring basis regarding the implementation of controls by third parties. Which of the […]
Which of the following commands would MOST likely provide the needed information?
An information security analyst is compiling data from a recent penetration test and reviews the following output: The analyst wants to obtain more information about the web-based services that are running on the target. Which of the following commands would MOST likely provide the needed information? A. ping -t 10.79.95.173.rdns.datacenters.com B. telnet 10.79.95.173 443 C. […]