<< Prev Question Next Question >>

Question 98/162

During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to the company's facility requires two-factor authentication using a badge and a passcode Which of the following should the administrator implement to find and remediate the Issue? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (162q)
Question 1: To reduce costs and overhead, an organization wants to move ...
Question 2: A Chief Security Officer (CSO) is concerned about the volume...
1 commentQuestion 3: Which two features are available only in next-generation fir...
Question 4: An attacked is attempting to exploit users by creating a fak...
Question 5: The IT department at a university is concerned about profess...
Question 6: A Chief Executive Officer (CEO) is dissatisfied with the lev...
Question 7: A hospital's administration is concerned about a potential l...
Question 8: The new Chief Executive Officer (CEO) of a large company has...
Question 9: Developers are writing code and merging it into shared repos...
Question 10: A network engineer has been asked to investigate why several...
Question 11: A cybersecurity administrator has a reduced team and needs t...
Question 12: A company just developed a new web application for a governm...
Question 13: When implementing automation with loT devices, which of the ...
Question 14: A remote user recently took a two-week vacation abroad and b...
Question 15: A company recently moved sensitive videos between on-premise...
Question 16: The security administrator has installed a new firewall whic...
Question 17: A company is implementing a new SIEM to log and send alerts ...
Question 18: A security analyst has received an alert about being sent vi...
Question 19: Local guidelines require that all information systems meet a...
Question 20: A security engineer needs to create a network segment that c...
Question 21: A new security engineer has started hardening systems. One o...
Question 22: The concept of connecting a user account across the systems ...
Question 23: A company wants to deploy systems alongside production syste...
Question 24: A Chief Executive Officer's (CEO) personal information was s...
Question 25: An organization's corporate offices were destroyed due to a ...
Question 26: A bank detects fraudulent activity on user's account. The us...
Question 27: An organization's help desk is flooded with phone calls from...
Question 28: A host was infected with malware. During the incident respon...
Question 29: Which of the following often operates in a client-server arc...
Question 30: Ann, a forensic analyst, needs to prove that the data she or...
Question 31: An organization with a low tolerance for user inconvenience ...
Question 32: An information security incident recently occurred at an org...
Question 33: The following are the logs of a successful attack. (Exhibit)...
Question 34: A security analyst is performing a forensic investigation co...
Question 35: A security administrator needs to inspect in-transit files o...
Question 36: A global pandemic is forcing a private organization to close...
Question 37: A security administrator needs to create a RAIS configuratio...
Question 38: A security analyst is looking for a solution to help communi...
Question 39: An organization is having difficulty correlating events from...
Question 40: A Chief Security Office's (CSO's) key priorities are to impr...
Question 41: A SOC is implementing an in sider-threat-detection program. ...
Question 42: A security researcher is attempting to gather data on the wi...
Question 43: To further secure a company's email system, an administrator...
Question 44: A multinational organization that offers web-based services ...
Question 45: Which of the following BEST describes a social-engineering a...
Question 46: Joe, a user at a company, clicked an email link led to a web...
Question 47: The manager who is responsible for a data set has asked a se...
Question 48: A security analyst needs to produce a document that details ...
Question 49: An employee has been charged with fraud and is suspected of ...
Question 50: A forensics investigator is examining a number of unauthoriz...
Question 51: Which of the following cryptographic concepts would a securi...
Question 52: The process of passively gathering information prior to laun...
Question 53: Which of the following would be BEST to establish between or...
Question 54: A workwide manufacturing company has been experiencing email...
Question 55: Which of the following BEST describes the method a security ...
Question 56: A recent security assessment revealed that an actor exploite...
Question 57: An organization recently recovered from a data breach. Durin...
Question 58: An analyst is trying to identify insecure services that are ...
Question 59: A network engineer is troubleshooting wireless network conne...
Question 60: An analyst has determined that a server was not patched and ...
Question 61: The SIEM at an organization has detected suspicious traffic ...
Question 62: A security analyst has received several reports of an issue ...
Question 63: A company is upgrading its wireless infrastructure to WPA2-E...
Question 64: Which of the following ISO standards is certified for privac...
Question 65: Which of the following refers to applications and systems th...
Question 66: A company is implementing MFA for all applications that stor...
Question 67: A malicious actor recently penetration a company's network a...
Question 68: A university with remote campuses, which all use different s...
Question 69: Entering a secure area requires passing through two doors, b...
Question 70: Which of the following would be BEST to establish between or...
Question 71: A company recently experienced an attack in which a maliciou...
Question 72: A security administrator checks the table of a network switc...
Question 73: A root cause analysis reveals that a web application outage ...
Question 74: A security architect at a large, multinational organization ...
Question 75: A company is designing the layout of a new datacenter so it ...
Question 76: A security analyst is investigating multiple hosts that are ...
Question 77: Which of the following is MOST likely to outline the roles a...
Question 78: The Chief Financial Officer (CFO) of an insurance company re...
Question 79: An attack relies on an end user visiting a website the end u...
Question 80: After entering a username and password, and administrator mu...
Question 81: A large enterprise has moved all Hs data to the cloud behind...
Question 82: A company is setting up a web server on the Internet that wi...
Question 83: A security analyst notices several attacks are being blocked...
Question 84: A symmetric encryption algorithm Is BEST suited for:...
Question 85: A nationwide company is experiencing unauthorized logins at ...
Question 86: A company's bank has reported that multiple corporate credit...
Question 87: A financial organization has adopted a new secure, encrypted...
Question 88: An organization has hired a security analyst to perform a pe...
Question 89: An organization is building backup sever moms in geographica...
Question 90: Which of the following should be put in place when negotiati...
Question 91: Which of the following describes the ability of code to targ...
1 commentQuestion 92: A company just implemented a new telework policy that allows...
Question 93: A security analyst receives the configuration of a current V...
Question 94: While reviewing pcap data, a network security analyst is abl...
Question 95: Which of the following terms should be included in a contrac...
Question 96: A manufacturing company has several one-off legacy informati...
Question 97: Joe, an employee, is transferring departments and is providi...
Question 98: During a routine scan of a wireless segment at a retail comp...
Question 99: Which of the following will MOST likely adversely impact the...
Question 100: A network engineer needs to build a solution that will allow...
Question 101: A company has discovered unauthorized devices are using its ...
Question 102: A security analyst discovers several .jpg photos from a cell...
Question 103: Some laptops recently went missing from a locked storage are...
Question 104: A network manager is concerned that business may be negative...
Question 105: Users at organization have been installing programs from the...
Question 106: A global company is experiencing unauthorized logging due to...
Question 107: A network administrator has been asked to install an IDS to ...
Question 108: Which of the following is MOST likely to contain ranked and ...
Question 109: Users have been issued smart cards that provide physical acc...
Question 110: After a ransomware attack a forensics company needs to revie...
Question 111: A large financial services firm recently released informatio...
Question 112: A web server administrator has redundant servers and needs t...
Question 113: A cybersecurity administrator needs to add disk redundancy f...
Question 114: The security team received a report of copyright infringemen...
Question 115: Which of the following would be BEST for a technician to rev...
Question 116: A user downloaded an extension for a browser, and the uses d...
Question 117: A security analyst is reviewing the output of a web server l...
Question 118: Which of the following BEST explains the difference between ...
Question 119: A security analyst needs to implement an MDM solution for BY...
Question 120: A security analyst is reviewing logs on a server and observe...
Question 121: A user's PC was recently infected by malware. The user has a...
Question 122: A small company that does not have security staff wants to i...
Question 123: Which of the following disaster recovery tests is The LEAST ...
Question 124: An analyst visits an internet forum looking for information ...
Question 125: A security administrator is trying to determine whether a se...
Question 126: A company recently experienced an attack during which its ma...
Question 127: A security analyst is running a vulnerability scan to check ...
Question 128: A security operations analyst is using the company's SIEM so...
Question 129: An engineer wants to access sensitive data from a corporate-...
Question 130: A security engineer needs to implement an MDM solution that ...
Question 131: A desktop support technician recently installed a new docume...
Question 132: A security engineer at an offline government facility is con...
Question 133: A security researching is tracking an adversary by noting it...
Question 134: An incident, which is affecting dozens of systems, involves ...
Question 135: Employees are having issues accessing the company's website....
Question 136: An organization needs to implement more stringent controls o...
Question 137: Which of the following controls would BEST identify and repo...
Question 138: A security researcher has alerted an organization that its s...
Question 139: An analyst Is generating a security report for the managemen...
Question 140: A company recently experienced a data breach and the source ...
Question 141: A small business just recovered from a ransomware attack aga...
Question 142: An.. that has a large number of mobile devices is exploring ...
Question 143: Which of the following are the MOST likely vectors for the u...
Question 144: A manufacturer creates designs for very high security produc...
Question 145: A commercial cyber-threat intelligence organization observes...
Question 146: A user is concerned that a web application will not be able ...
Question 147: A system administrator needs to implement an access control ...
Question 148: A startup company is using multiple SaaS and IaaS platform t...
Question 149: An attacker was easily able to log in to a company's securit...
Question 150: An organization's RPO for a critical system is two hours. Th...
Question 151: A Chief Information Officer receives an email stating a data...
Question 152: Which of the following environments would MOST likely be use...
Question 153: To secure an application after a large data breach, an e-com...
Question 154: An organization regularly scans its infrastructure for missi...
Question 155: An organization is concerned about hackers potentially enter...
Question 156: A security administrator suspects there may be unnecessary s...
Question 157: The human resources department of a large online retailer ha...
Question 158: Which of the following would satisfy three-factor authentica...
Question 159: A security analyst needs to perform periodic vulnerably scan...
Question 160: A Chief Security Officer (CSO) was notified that a customer ...
Question 161: An organization has implemented a two-step verification proc...
Question 162: A security analyst is investigating an incident to determine...