PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which of the following attacks?

A security administrator notices large amounts of traffic within the network heading out to an
external website. The website seems to be a fake bank site with a phone number that when called,
asks for sensitive information. After further investigation, the security administrator notices that a
fake link was sent to several users. This is an example of which of the following attacks?

Which of the following controls could they implement to BEST meet this goal?

A company’s employees were victims of a spear phishing campaign impersonating the CEO. The
company would now like to implement a solution to improve the overall security posture by
assuring their employees that email originated from the CEO. Which of the following controls could
they implement to BEST meet this goal?

Which of the following technical controls must be implemented to enforce the corporate policy?

A security administrator must implement all requirements in the following corporate policy:
Passwords shall be protected against offline password brute force attacks. Passwords shall be
protected against online password brute force attacks. Which of the following technical controls
must be implemented to enforce the corporate policy? (Select THREE).