Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user needs to complete training at https://comptiatraining.com. After manually entering the URL, the user sees that the accessed website is noticeably different from the standard company website. Which of the following is the most likely explanation for the difference?

A.

Cross-site scripting

B.

Pretexting

C.

Typosquatting

D.

Vishing

Which of the following incident response activities ensures evidence is properly handied?

A.

E-discovery

B.

Chain of custody

C.

Legal hold

D.

Preservation

Which of the following security principles most likely requires validation before allowing traffic between systems?

A.

Policy enforcement

B.

Authentication

C.

Zero Trust architecture

D.

Confidentiality

After a security awareness training session, a user called the IT help desk and reported a suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit card information in order to close an invoice. Which of the following topics did the user recognize from the training?

A.

Insider threat

B.

Email phishing

C.

Social engineering

D.

Executive whaling

Which of the following can be used to mitigate attacks from high-risk regions?

A.

Obfuscation

B.

Data sovereignty

C.

IP geolocation

D.

Encryption

A systems administrator discovers a system that is no longer receiving support from the vendor. However, this system and its environment are critical to running the business, cannot be modified, and must stay online. Which of the following risk treatments is the most appropriate in this situation?

A.

Refect

B.

Accept

C.

Transfer

D.

Avoid

A company needs to determine whether authentication weaknesses in a customer-facing web application exist. Which of the following is the best technique to use?

A.

Static analysis

B.

Packet capture

C.

Agent-based scanning

D.

Dynamic analysis

E.

Network-based scanning

Which of the following allows an exploit to go undetected by the operating system?

A.

Firmware vulnerabilities

B.

Side loading

C.

Memory injection

D.

Encrypted payloads

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the Mowing describes the administrator's role?

A.

Processor

B.

Custodian

C.

Privacy officer

D.

Owner

While a user reviews their email, a host gets infected by malware from an external hard drive plugged into the host. The malware steals all the user's credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?

A.

Operational security

B.

Removable media and cables

C.

Password management

D.

Social engineering

A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?

A.

Load balancer

B.

Port security

C.

IPS

D.

NGFW

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

A.

If a security incident occurs on the device, the correct employee can be notified.

B.

The security team will be able to send user awareness training to the appropriate device.

C.

Users can be mapped to their devices when configuring software MFA tokens.

D.

User-based firewall policies can be correctly targeted to the appropriate laptops.

E.

When conducting penetration testing, the security team will be able to target the desired laptops.

F.

Company data can be accounted for when the employee leaves the organization.

A security analyst needs to propose a remediation plan 'or each item in a risk register. The item with the highest priority requires employees to have separate logins for SaaS solutions and different password complexity requirements for each solution. Which of the following implementation plans will most likely resolve this security issue?

A.

Creating a unified password complexity standard

B.

Integrating each SaaS solution with the Identity provider

C.

Securing access to each SaaS by using a single wildcard certificate

D.

Configuring geofencing on each SaaS solution

Which of the following exercises should an organization use to improve its incident response process?

A.

Tabletop

B.

Replication

C.

Failover

D.

Recovery

A company wants to protect a specialized legacy platform that controls the physical flow of gas inside of pipes. Which of the following environments does the company need to secure to best achieve this goal?

A.

IaaS

B.

SCADA

C.

SDN

D.

IoT