PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following security controls will MOST like…

Wireless users are reporting issues with the company’s video conferencing and VoIP systems. The security administrator notices internal DoS attacks from infected
PCs on the network causing the VoIP system to drop calls. The security administrator also notices that the SIP servers are unavailable during these attacks. Which
of the following security controls will MOST likely mitigate the VoIP DoS attacks on the network? (Select TWO).

Which of the following BEST provides insight into where…

The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application
servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection
software is not reporting any issues. Which of the following BEST provides insight into where the compromised server collected the information?

Which of the following controls MUST be implemented to …

A bank is in the process of developing a new mobile application. The mobile client renders content and communicates back to the company servers via REST/
JSON calls. The bank wants to ensure that the communication is stateless between the mobile application and the web services gateway. Which of the following
controls MUST be implemented to enable stateless communication?

Which of the following is the MOST likely cause of the …

After the install process, a software application executed an online activation process. After a few months, the system experienced a hardware failure. A backup
image of the system was restored on a newer revision of the same brand and model device. After the restore, the specialized application no longer works. Which of
the following is the MOST likely cause of the problem?

Which of the following documents is MOST likely to cont…

A medical device manufacturer has decided to work with another international organization to develop the software for a new robotic surgical platform to be
introduced into hospitals within the next 12 months. In order to ensure a competitor does not become aware, management at the medical device manufacturer has
decided to keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a description of the initial terms and
arrangement and is not legally enforceable?

Which of the following security assessment methods are …

The following has been discovered in an internally developed application:

Error – Memory allocated but not freed:
char *myBuffer = malloc(BUFFER_SIZE);
if (myBuffer != NULL) {
*myBuffer = STRING_WELCOME_MESSAGE;
printf(“Welcome to: %s\\n”, myBuffer);
}

exit(0);
Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).

Which of the following provides the MOST secure method …

An organization recently upgraded its wireless infrastructure to support 802.1x and requires all clients to use this method. After the upgrade, several critical wireless
clients fail to connect because they are only pre-shared key compliant. For the foreseeable future, none of the affected clients have an upgrade path to put them
into compliance with the 802.1x requirement. Which of the following provides the MOST secure method of integrating the non-compliant clients into the network?

Which of the following is occurring on the network?

The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled:
Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface’s MAC is 00-01-42-32-ab-1a
A packet capture shows the following:
09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)
09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length

65534
09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 65534
09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534
Which of the following is occurring on the network?

which of the following strategies should be employed?

The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this
year’s growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start
of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible. Starting two years ago, the growth in the number of PC boot loader
attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?


Page 452 of 4,924« First...102030...450451452453454...460470480...Last »