Which of the following social engineering attacks would…
Which of the following social engineering attacks would describe a situation where an attacker calls an employee while impersonating a corporate executive?
Which of the following attacks would be used to cause t…
An attacker would like to target a company and redirect their legitimate traffic to other sites. Which of the following attacks would be used to cause this malicious
URL redirection?
which of the following is considered a threat?
When performing a risk analysis, which of the following is considered a threat?
Which of the following could be implemented to address …
A recent security audit revealed the company is lacking deterrent security controls. Which of the following could be implemented to address this finding?
Which of the following is the BEST solution to satisfy …
A research user needs to transfer multiple terabytes of data across a network. The data is not confidential, so for performance reasons, does not need to be
encrypted. However, the authentication process must be confidential. Which of the following is the BEST solution to satisfy these requirements?
Which of the following is a contract with a service pro…
Which of the following is a contract with a service provider that typically includes performance parameters like MTBF and MTTR?
In the case where a company creates a private cloud, th…
One of the driving factors towards moving an application to a cloud infrastructure is increased application availability. In the case where a company creates a private
cloud, the risk of application downtime is being:
Which of the following security goals is the company tr…
A company uses digital signatures to sign contracts. The company requires external entities to create an account with a third-party digital signature provider and to
sign an agreement stating that they will protect the account from unauthorized access. Which of the following security goals is the company trying to address in the
given scenario?
Which of the following solutions would have prevented t…
Several computers in an organization are running below the normal performance baseline. A security administrator inspects the computers and finds the following
pieces of information:
– Several users have uninstalled the antivirus software
– Some users have installed unauthorized software
– Several users have installed pirated software
– Some computers have had automatic updating disabled after being deployed
– Users have experienced slow responsiveness when using the Internet browser
– Users have complete control over critical system properties
Which of the following solutions would have prevented these issues from occurring? (Select TWO).
Which of the following is an active technique that will…
An attacker is attempting to determine the patch level version that a web server is running on its open ports. Which of the following is an active technique that will
MOST efficiently determine the information the attacker is seeking?