Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

RevoMedia, a digital marketing agency, often conducts client presentations off-site. The agency’s team uses mobile devices to connect to various networks and display content. Withthe rising threat landscape, it wants to adopt the most secure method for connecting its mobile devices to unfamiliar networks. Which of the following should RevoMedia adopt?

A.

Bluetooth pairing

B.

Virtual Private Network (VPN) connections

C.

USB tethering

D.

Direct Wi-Fi connectivity

Cassius, a security professional, works for the risk management team in an organization. The team is responsible for performing various activities involved in the risk management process. In this process, Cassius was instructed to select and implement appropriate controls on the identified risks in order to address the risks based on their severity level.

Which of the following risk management phases was Cassius instructed to perform in the above scenario?

A.

Risk analysis

B.

Risk treatment

C.

Risk prioritization

D.

Risk identification

As a cybersecurity technician, you were assigned to analyze the file system of a Linux image captured from a device that has been attacked recently. Study the forensic image'Evidenced.img" in the Documents folder of the "Attacker Machine-1" and identify a user from the image file. (Practical Question)

A.

smith

B.

attacker

C.

roger

D.

john

Maisie. a new employee at an organization, was given an access badge with access to only the first and third floors of the organizational premises. Maisie Hied scanning her access badge against the badge reader at the second-floor entrance but was unsuccessful. Identify the short-range wireless communication technology used by the organization in this scenario.

A.

RFID

B.

Li-Fi

C.

Bluetooth

D.

Wi Fi

Jane Is a newly appointed Chief Financial Officer at BigTech Corp. Within a week, she receives an email from a sender posing as the company’s CEO. instructing her to make an urgent wire transfer. Suspicious. Jane decides to verify the request's authenticity. She receives another email from the same sender, now attaching a seemingly scanned Image of the CEO's handwritten note. Simultaneously, she gets a call from an 'IT support' representative, instructing her to click on the attached image to download a 'security patch'. Concerned. Jane must determine which social engineering tactics she encountered.

A.

Baiting via the handwritten note image and preloading through the 'IT support' call.

B.

Spear phishing through both the emails and quizzing via the 'IT support' call.

C.

Phishing through the CEO impersonation email and baiting via the 'IT support' call.

D.

Spear phishing through the CEO impersonation email and vishing via the 'IT support' call.

NovusCorp, a leading healthcare provider, had meticulously designed its BC and DR plans, ensuring every potential risk was covered. Recently, its primary data center experienced a catastrophic flood. It swiftly activated its DR plan, transferring operations to its secondary data center. But within 24 hours, the provider faced an unforeseen challenge: the secondary data center began to receive a huge, unprecedented amount of data requests, causing system overloads and disruptions. This situation was not a part of the provider's initial risk assessment. In the face of this predicament, what should NovusCorp's immediate course of action be to ensure business continuity?

A.

Allocate resources to upgrade the secondary data center's infrastructure to handle the increased data request loads.

B.

Initiate an immediate Tailback to the primary data center despite potential risks.

C.

Engage a cloud based data storage provider for temporary overflow until the primary center is restored.

D.

Reduce non-critical data requests and impose temporary restrictions on data access to maintain system stability.

Riley sent a secret message to Louis. Before sending the message, Riley digitally signed the message using his private key. Louis received the message, verified the digital signature using the corresponding key to ensure that the message was not tampered during transit.

Which of the following keys did Louis use to verify the digital signature in the above scenario?

A.

Riley's public key

B.

Louis's public key

C.

Riley's private key

D.

Louis's private key

George, a security professional at an MNC, implemented an Internet access policy that allowed employees working from a remote location to access any site, download anyapplication, and access any computer or network without any restrictions. Identify the type of Internet access policy implemented by George in this scenario.

A.

Permissive policy

B.

Paranoid policy

C.

Prudent policy

D.

Promiscuous policy

Nancy, a security specialist, was instructed to identify issues related to unexpected shutdown and restarts on a Linux machine. To identify the incident cause, Nancy navigated to a directory on the Linux system and accessed a log file to troubleshoot problems related to improper shutdowns and unplanned restarts.

Identify the Linux log file accessed by Nancy in the above scenario.

A.

/var/log/secure

B.

/var/log/kern.log

C.

/var/log/boot.log

D.

/var/log/lighttpd/

TechSolutions, a leading IT consultancy, has been contracted to overhaul the wireless network infrastructure for the city's public libraries. With thousands of users accessing the network daily, there is a critical need for robust encryption that can deter potential threats. TechSolutions must also consider the diverse range of devices used by library»goers and ensure backward compatibility. Which encryption mechanism would best suit this scenario?

A.

WPA3 (Wi-Fi Protected Access 3)

B.

WEP (Wired Equivalent Privacy)

C.

TKIP (Temporal Key Integrity Protocol)

D.

AES-CCMP (Advanced Encryption Standard with Counter Mode Cipher Block Chaining Message Authentication Code Protocol)