Refer to the exhibit. What type of traffic will the policy be applied to when the router is configured with the class-map and policy-map shown?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. What type of traffic will the policy be applied to when the router is configured with the class-map and policy-map shown? class-map type inspect match-all INTERNAL-WEB  match…

Continue ReadingRefer to the exhibit. What type of traffic will the policy be applied to when the router is configured with the class-map and policy-map shown?

An administrator wishes to create a security policy document for end-users to protect against known unsafe websites and to warn the user about the dangers and handling of suspicious emails. What type of malware attack is being prevented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An administrator wishes to create a security policy document for end-users to protect against known unsafe websites and to warn the user about the dangers and handling of suspicious emails.…

Continue ReadingAn administrator wishes to create a security policy document for end-users to protect against known unsafe websites and to warn the user about the dangers and handling of suspicious emails. What type of malware attack is being prevented?

What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain? Event Viewer security log Computer Management…

Continue ReadingWhat Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Which type of DNS attack involves a threat actor creating multiple bogus sub-domains under a legitimate parent domain?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of DNS attack involves a threat actor creating multiple bogus sub-domains under a legitimate parent domain? DNS Stealth attacks DNS Domain Shadowing attacks DNS Tunneling attacks DNS Open…

Continue ReadingWhich type of DNS attack involves a threat actor creating multiple bogus sub-domains under a legitimate parent domain?

Match the security policy to its description.

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Match the security policy to its description. Identifies change management, change control or asset management practices ==> Organizational policy Defines users permitted access to network resources and the verification procedures in…

Continue ReadingMatch the security policy to its description.

The IT team in a company is reviewing network access by teleworkers. The team identifies a security risk based on the fact that a few employees do not change their login credentials as expected. Which security policy should the team modify and deploy to address the issue?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

The IT team in a company is reviewing network access by teleworkers. The team identifies a security risk based on the fact that a few employees do not change their…

Continue ReadingThe IT team in a company is reviewing network access by teleworkers. The team identifies a security risk based on the fact that a few employees do not change their login credentials as expected. Which security policy should the team modify and deploy to address the issue?

In which phase of the NIST Incident Response Life Cycle are the vulnerabilities that have been exploited by the attacker corrected and patched?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

In which phase of the NIST Incident Response Life Cycle are the vulnerabilities that have been exploited by the attacker corrected and patched? Containment, Eradication, and Recovery Post-Incident Activities Detection…

Continue ReadingIn which phase of the NIST Incident Response Life Cycle are the vulnerabilities that have been exploited by the attacker corrected and patched?

Refer to the exhibit. The help desk receives a work order describing an issue with a management application running on PC-B. The work order states that the network management application cannot receive syslog messages from the LAN switch after upgrading PC-B to the latest version of Windows 10. A ping request from PC-A to PC-B fails, but both PCs are able to successfully ping the connected switch VLAN1 IP address. The technician temporarily disables the Windows Defender Firewall on PC-B for both the private and public networks. The ping request from PC-A to PC-B succeeds and the application on PC-B can receive the syslog messages from the switch. Which action should the technician perform to correct the reported issue without compromising the security of the LAN?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. The help desk receives a work order describing an issue with a management application running on PC-B. The work order states that the network management application…

Continue ReadingRefer to the exhibit. The help desk receives a work order describing an issue with a management application running on PC-B. The work order states that the network management application cannot receive syslog messages from the LAN switch after upgrading PC-B to the latest version of Windows 10. A ping request from PC-A to PC-B fails, but both PCs are able to successfully ping the connected switch VLAN1 IP address. The technician temporarily disables the Windows Defender Firewall on PC-B for both the private and public networks. The ping request from PC-A to PC-B succeeds and the application on PC-B can receive the syslog messages from the switch. Which action should the technician perform to correct the reported issue without compromising the security of the LAN?

A software company uses a public cloud service for hosting development and deployment services. The company is evaluating options to protect against data breaches and compromised login credentials. What two countermeasures should be implemented? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A software company uses a public cloud service for hosting development and deployment services. The company is evaluating options to protect against data breaches and compromised login credentials. What two…

Continue ReadingA software company uses a public cloud service for hosting development and deployment services. The company is evaluating options to protect against data breaches and compromised login credentials. What two countermeasures should be implemented? (Choose two.)

Refer to the exhibit. The wireless router firewall is configured as shown. What action will be taken when packets that originate from the internet and have a destination IP address of 192.168.1.101 are received by the firewall?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. The wireless router firewall is configured as shown. What action will be taken when packets that originate from the internet and have a destination IP address of…

Continue ReadingRefer to the exhibit. The wireless router firewall is configured as shown. What action will be taken when packets that originate from the internet and have a destination IP address of 192.168.1.101 are received by the firewall?

An organization needs to implement a solution that would enable them to determine the order of security events occurring on the network. What technology should be implemented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

An organization needs to implement a solution that would enable them to determine the order of security events occurring on the network. What technology should be implemented? DHCP SNMP NTP…

Continue ReadingAn organization needs to implement a solution that would enable them to determine the order of security events occurring on the network. What technology should be implemented?

Refer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used…

Continue ReadingRefer to the exhibit. A specialist in the information security team is reviewing the Webroot threat report 2020. Based on the findings in the report, what is a technique used by ransomware attackers that results in making it more difficult for legal teams to track their activities?

A company has set a policy that employees will be required to report any observed or suspected security issues. Which control type has the company implemented?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A company has set a policy that employees will be required to report any observed or suspected security issues. Which control type has the company implemented? administrative controls technical controls…

Continue ReadingA company has set a policy that employees will be required to report any observed or suspected security issues. Which control type has the company implemented?

What are three actions taken in the Detection & Analysis phase of the NIST Incident Response Life Cycle? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

What are three actions taken in the Detection & Analysis phase of the NIST Incident Response Life Cycle? (Choose three.) The CSIRT performs an initial analysis to determine the incident’s…

Continue ReadingWhat are three actions taken in the Detection & Analysis phase of the NIST Incident Response Life Cycle? (Choose three.)

A cybersecurity technician sets up a honeypot within a separate DMZ of the enterprise network. What is the purpose of doing this?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

A cybersecurity technician sets up a honeypot within a separate DMZ of the enterprise network. What is the purpose of doing this? to set up an audit trail of threat…

Continue ReadingA cybersecurity technician sets up a honeypot within a separate DMZ of the enterprise network. What is the purpose of doing this?

A company provides service to process transaction data for clients. The company deals with sensitive customer information of their clients. The improper release of the information poses a serious risk to the business of the company and their clients. The information security team in the company identifies threats coming from accidentally emailing the information to an unintended party. Which two action plans could the company implement to eliminate the risk? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company provides service to process transaction data for clients. The company deals with sensitive customer information of their clients. The improper release of the information poses a serious risk…

Continue ReadingA company provides service to process transaction data for clients. The company deals with sensitive customer information of their clients. The improper release of the information poses a serious risk to the business of the company and their clients. The information security team in the company identifies threats coming from accidentally emailing the information to an unintended party. Which two action plans could the company implement to eliminate the risk? (Choose two.)