![]() ![]() A large number of email messages were later posted online. ![]() As the devices are not enrolled to the domain and d not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO)Ī) create a new network for the mobile devices and block the communication to the internal network and serversī) use a captive portal for user authenticationĬ) authenticate users using OAuth for more resiliencyĭ) implement SSO and allow communication to the internal networkĮ) use the existing network and allow communication to the internal network and serversį) use a new and updated RADIUS server to maintain the best solution B) use a captive portal for user authenticationĬ) authenticate users using OAuth for more resiliency A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. Which of the following is the BEST solution to prevent this type of incident from occurring again?Ī) enforce the use of a controller trusted source of container imagesī) deploy an IPS solution capable of detecting signatures of attacks targeting obtainedĬ) define a vulnerability scan to assess container images before being introduced on the environmentĭ) create a dedicated VPC for the containerized environment Enforce the user of a controller trusted source of container images A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. The investigation detected that a zero-day vulnerability was introduced when the latest container image version was downloaded from a public registry. ![]() Which of the following cloud deployment strategies would BEST meet this need(ĭ) hybrid Community A backdoor was detected on the containerized application environment. Which of the following tools will the other team member MOST likely use to open this file?ĭ) wire shark Wireshark Several universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following techniques will the systems analyst MOST likely implement to address this issue?ĭ) DLP Firewall rules A security analyst generated a file named host1.pcap and shared it with a team member who is going to use it for further incident analysis. Which of the following explains this process?ĭ) chain of custody Legal hold Which of the following is a detective and deterrent control against physical intrusions?ĭ) a sign A lock A systems analyst determines the source of a high number of connections to web server that were initiated by ten different IP addresses that belong to a network block in a specific country. ![]() Which of the following attacks is being conducted?Į) DDoS Evil twin Which for the following BEST helps to demonstrate integrity during a forensic investigation?ĭ) snapshots Hashing Law enforcement officials sent a company a notification that states electronically stored information and paper documents cannot be destroyed. The analyst also discovers a couple of WAPs are using the same SSID, but they have non-standard DHCP configurations and an overlapping channel. Upon further investigation, the analyst noticed that successful login attempts are being conducted with impossible travel times during the same time periods when the unauthorized downloads are occurring. Which of the following should the analyst include in this documentation? (Choose two)į) a warning banner The provenance of the artifacts AND the date and time A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. A systems analyst is responsible for generating a new digital forensics chain-of-custody form. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |