Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Sine© a recent upgrade (o a WLAN infrastructure, several mobile users have been unable to access the internet from the lobby. The networking team performs a heat map survey of the building and finds several WAPs in the area. The WAPs are using similar frequencies with high power settings. Which of the following installation considerations should the security team evaluate next?

A.

Channel overlap

B.

Encryption type

C.

New WLAN deployment

D.

WAP placement

Which of the following describes the process of concealing code or text inside a graphical image?

A.

Symmetric encryption

B.

Hashing

C.

Data masking

D.

Steganography

A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

A.

The user jsmith's account has been locked out.

B.

A keylogger is installed on [smith's workstation

C.

An attacker is attempting to brute force ismith's account.

D.

Ransomware has been deployed in the domain.

The security operations center is researching an event concerning a suspicious IP address A security analyst looks at the following event logs and discovers that a significant portion of the user accounts have experienced faded log-In attempts when authenticating from the same IP address:

Which of the following most likely describes attack that took place?

A.

Spraying

B.

Brute-force

C.

Dictionary

D.

Rainbow table

Which of the following organizational documents is most often used to establish and communicate expectations associated with integrity and ethical behavior within an organization?

A.

AUP

B.

SLA

C.

EULA

D.

MOA

The help desk receives multiple calls that machines with an outdated OS version are running slowly. Several users are seeing virus detection alerts. Which of the following mitigation techniques should be reviewed first?

A.

Patching

B.

Segmentation

C.

Monitoring

D.

Isolation

A company's accounts payable clerk receives a message from a vendor asking to change their bank account before paying an invoice. The clerk makes the change and sends the payment to the new account. Days later, the clerk receives another message from the same vendor with a request for a missing payment to the original bank account. Which of the following has most likely occurred?

A.

Phishing campaign

B.

Data exfiltration

C.

Pretext calling

D.

Business email compromise

Which of the following should a systems administrator use to decrease the company's hardware attack surface?

A.

Replication

B.

Isolation

C.

Centralization

D.

Virtualization

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

A.

Penetration test

B.

Continuity of operations planning

C.

Tabletop exercise

D.

Simulation

Which of the following control types is AUP an example of?

A.

Physical

B.

Managerial

C.

Technical

D.

Operational

Which of the following is die most important security concern when using legacy systems to provide production service?

A.

Instability

B.

Lack of vendor support

C.

Loss of availability

D.

Use of insecure protocols

Which of the following is a risk of conducting a vulnerability assessment?

A.

A disruption of business operations

B.

Unauthorized access to the system

C.

Reports of false positives

D.

Finding security gaps in the system

An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?

A.

Side loading

B.

Target of evaluation

C.

Resource reuse

D.

SQL injection

An organization's web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization's web servers? (Select two).

A.

Regularly updating server software and patches

B.

Implementing strong password policies

C.

Encrypting sensitive data at rest and in transit

D.

Utilizing a web-application firewall

E.

Performing regular vulnerability scans

F.

Removing payment information from the servers

Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company's internal network?

A.

VPN

B.

LDAP

C.

FTP

D.

RADIUS