<< Prev Question Next Question >>

Question 21/133

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (133q)
Question 1: A financial institution would like to stare is customer data...
Question 2: A company is adopting a BYOD policy and is looking for a com...
Question 3: An organization has a growing workforce that is mostly drive...
Question 4: A global company is experiencing unauthorized logging due to...
Question 5: The cost of 'Cmovable media and the security risks of transp...
Question 6: A recently discovered zero-day exploit utilizes an unknown v...
Question 7: The process of passively gathering information prior to laun...
Question 8: A network administrator is concerned about users being expos...
Question 9: An analyst needs to set up a method for securely transferrin...
Question 10: The Chief Financial Officer (CFO) of an insurance company re...
Question 11: Which of the following provides the BEST protection for sens...
Question 12: Which of the following will MOST likely cause machine learni...
Question 13: A database administrator needs to ensure all passwords are s...
Question 14: The Chief Executive Officer (CEO) of an organization would l...
Question 15: An incident, which is affecting dozens of systems, involves ...
Question 16: Which of the following will provide the BEST physical securi...
Question 17: A security engineer is reviewing log files after a third dis...
Question 18: A small business office is setting up a wireless infrastruct...
Question 19: An attacker was easily able to log in to a company's securit...
Question 20: An organization regularly scans its infrastructure for missi...
Question 21: A vulnerability assessment report will include the CVSS scor...
Question 22: A Chief Security Officer (CSO) was notified that a customer ...
Question 23: An attacker is attempting to exploit users by creating a fak...
Question 24: A security analyst needs to complete an assessment. The anal...
Question 25: A company wants to deploy PKI on its Internet-facing website...
Question 26: Several large orders of merchandise were recently purchased ...
Question 27: A security engineer obtained the following output from a thr...
Question 28: During a security assessment, a security finds a file with o...
Question 29: An organization has been experiencing outages during holiday...
Question 30: Which of the following relets to applications and systems th...
Question 31: Which of the following utilize a subset of real data and are...
Question 32: A user enters a password to log in to a workstation and is t...
Question 33: An analyst has determined that a server was not patched and ...
Question 34: An organization's Chief Security Officer (CSO) wants to vali...
Question 35: A cybersecurity manager has scheduled biannual meetings with...
Question 36: An organization has hired a security analyst to perform a pe...
Question 37: Which of the following often operates in a client-server arc...
Question 38: Given the following logs: (Exhibit) Which of the following B...
Question 39: Accompany deployed a WiFi access point in a public area and ...
Question 40: An analyst needs to identify the applications a user was run...
Question 41: A security administrator is trying to determine whether a se...
Question 42: A security engineer at an offline government facility is con...
Question 43: An enterprise has hired an outside security firm to conduct ...
Question 44: A company recently experienced a data breach and the source ...
Question 45: A development team employs a practice of bringing all the co...
Question 46: A network administrator has been asked to install an IDS to ...
Question 47: A system administrator needs to implement an access control ...
Question 48: Which of the following is the BEST reason to maintain a func...
Question 49: A cybersecurity administrator has a reduced team and needs t...
Question 50: Which of the following would be BEST to establish between or...
Question 51: A security analyst needs to perform periodic vulnerability s...
Question 52: A500 is implementing an insider threat detection program, Th...
Question 53: A security analyst sees the following log output while revie...
Question 54: A researcher has been analyzing large data sets for the last...
Question 55: A remote user recently took a two-week vacation abroad and b...
Question 56: Which of the following scenarios would make a DNS sinkhole e...
Question 57: Following a prolonged datacenter outage that affected web-ba...
Question 58: An organization's help desk is flooded with phone calls from...
Question 59: Which of the following would be the BEST resource for a soft...
Question 60: Which of the following describes the BEST approach for deplo...
Question 61: A security analyst needs to generate a server certificate to...
Question 62: A security operations analyst is using the company's SIEM so...
Question 63: The lessons-learned analysis from a recent incident reveals ...
Question 64: A nuclear plant was the victim of a recent attack, and all t...
Question 65: A multinational organization that offers web-based services ...
Question 66: An organization is concerned that its hosted web servers are...
Question 67: A company is designing the layout of a new datacenter so it ...
Question 68: A technician needs to prevent data loss in a laboratory. The...
Question 69: A security analyst is investigating an incident to determine...
Question 70: A public relations team will be taking a group of guest on a...
Question 71: A remote user recently took a two-week vacation abroad and b...
Question 72: An engineer is setting up a VDI environment for a factory lo...
Question 73: A recent malware outbreak across a subnet included successfu...
Question 74: A security analyst is reviewing the following output from a ...
Question 75: A external forensics investigator has been hired to investig...
Question 76: A network administrator has been alerted that web pages are ...
Question 77: A security analyst receives a SIEM alert that someone logged...
Question 78: A privileged user at a company stole several proprietary doc...
Question 79: The new Chief Executive Officer (CEO) of a large company has...
Question 80: A security modern may have occurred on the desktop PC of an ...
Question 81: A retail executive recently accepted a job with a major comp...
Question 82: A security analyst is performing a forensic investigation co...
Question 83: An engineer wants to access sensitive data from a corporate-...
Question 84: A network engineer notices the VPN concentrator overloaded a...
Question 85: Which of the following would cause a Chief Information Secur...
Question 86: An.. that has a large number of mobile devices is exploring ...
Question 87: Which of the following are the MOST likely vectors for the u...
Question 88: n organization plans to transition the intrusion detection a...
Question 89: Which of the following algorithms has the SMALLEST key size?...
Question 90: A company is launching a new internet platform for its clien...
Question 91: A security analyst is configuring a large number of new comp...
Question 92: A cybersecurity administrator is using iptables as an enterp...
Question 93: A security administrator is analyzing the corporate wireless...
Question 94: A financial organization has adopted a new secure, encrypted...
Question 95: A security analyst is reviewing the following attack log out...
Question 96: A network administrator would like to configure a site-to-si...
Question 97: Which of the following are requirements that must be configu...
Question 98: To further secure a company's email system, an administrator...
Question 99: Which of the following organizational policies are MOST like...
Question 100: Which of the following is the correct order of volatility fr...
Question 101: A cybersecurity analyst reviews the log files from a web ser...
Question 102: An analyst is trying to identify insecure services that are ...
Question 103: A bank detects fraudulent activity on user's account. The us...
Question 104: While checking logs, a security engineer notices a number of...
Question 105: A Chief Security Officer (CSO) is concerned about the volume...
Question 106: A small company that does not have security staff wants to i...
Question 107: After reading a security bulletin, a network security manage...
Question 108: Which of the following BEST describes a security exploit for...
Question 109: Which of the following is a reason why an organization would...
Question 110: After consulting with the Chief Risk Officer (CRO). a manage...
Question 111: An organization has decided to host its web application and ...
Question 112: A security analyst is running a vulnerability scan to check ...
Question 113: The SOC is reviewing process and procedures after a recent i...
Question 114: An organization blocks user access to command-line interpret...
Question 115: A network technician is installing a guest wireless network ...
Question 116: An organization has implemented a two-step verification proc...
Question 117: A cybersecurity department purchased o new PAM solution. The...
Question 118: A security analyst discovers several .jpg photos from a cell...
Question 119: The CSIRT is reviewing the lessons learned from a recent inc...
Question 120: Which of the following will MOST likely adversely impact the...
Question 121: Phishing and spear-phishing attacks have been occurring more...
Question 122: Which of the following disaster recovery tests is The LEAST ...
Question 123: An auditor is performing an assessment of a security applian...
Question 124: An organization is having difficulty correlating events from...
Question 125: Which of the following BEST explains the difference between ...
Question 126: A security analyst receives the configuration of a current V...
Question 127: A user recent an SMS on a mobile phone that asked for bank d...
Question 128: A network engineer needs to create a plan for upgrading the ...
Question 129: An organization is developing a plan in the event of a compl...
Question 130: An incident response technician collected a mobile device du...
Question 131: Local guidelines require that all information systems meet a...
Question 132: During an incident response, a security analyst observes the...
Question 133: When used at the design stage, which of the following improv...