Which of the following BEST describes a social engineering attack that relies on an executive

QUESTION NO: 1
A company wants to restrict emailing of PHI documents. The company is implementing a DLP solution In order to reslnct PHI documents which of the following should be performed FIRST?

A. Change management B. Classification C. Retention D. Governance

QUESTION NO: 2
Which of the following are the BEST ways to implement remote home access to a company's intranet systems if establishing an always-on VPN is not an option? (Select Two)

A. Implement a SSO solution B. Configure SNMPv3 server and clients. C. Establish SSH access to a jump server D. Enable MFA for intranet systems E. Create NAT on the firewall for intranet systems F. Install VPN concentrations at home offices

QUESTION NO: 3
Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?

A. To ensure availability B. To protect surveillance logs C. To facilitate third-party access D. To avoid data leakage

QUESTION NO: 4
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?

A. DNS poisoning B. On-path C. Domain hijacking D. Evil twin

QUESTION NO: 5
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?

A. Password age B. Password reuse C. Password history D. Password complexity

QUESTION NO: 6
DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way. Which of the following options BEST fulfils the architect's requirements?

A. Use of multipath by adding more connections to cloud storage B. An orchestration solution that can adjust scalability of cloud assets C. Cloud assets replicated on geographically distributed regions D. An on-site backup that is deployed and only used when the load increases

Correct Answer: B

Explanation: (Only visible for Pass4Test members)

QUESTION NO: 7
The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:
* Users to choose a password unique to their last ten passwords
* Users to not log in from certain high-risk countries
Which of the following should the security team implement? (Select TWO).

A. Password reuse B. Geotagging C. Password history D. Geolocation E. Geofencing F. Password complexity

QUESTION NO: 8
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?

A. Semi-authorized hackers B. Script kiddies C. Advanced persistent threats D. State actors

QUESTION NO: 9
During a security incident investigation, an analyst consults the company's SIEM and sees an event concerning high traffic to a known, malicious command-and-control server. The analyst would like to determine the number of company workstations that may be impacted by this issue. Which of the following can provide the information?

A. WAF logs B. DNS logs C. System logs D. Application logs

QUESTION NO: 10
Which biometric error would allow an unauthorized user to access a system?

A. False denial B. False rejection C. False entrance D. False acceptance

QUESTION NO: 11
A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage.
Which of the following is the BEST remediation for this data leak?

A. MDM B. CASB C. User training D. DLP

QUESTION NO: 12
Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?

A. A SPIM notification claiming to be undercover law enforcement investigating a cybercrime B. A vishing call that requests a donation be made to a local charity C. A phishing email stating a cash settlement has been awarded but will expire soon D. A smishing message stating a package is scheduled for pickup

Correct Answer: C

Explanation: (Only visible for Pass4Test members)

QUESTION NO: 13
Several users have opened tickets with the help desk. The help desk has reassigned the tickets to a secunty analyst for further review The security analyst reviews the following metrics:

Which of the following BEST describes a social engineering attack that relies on an executive

Which of the following is MOST likely the result of the security analyst's review?

A. Corporate PCs have been turned into a botnet B. An on-path attack is taking place between PCs and the router C. The user of the Sales-PC fell for a phishing attack D. The ISP is dropping outbound connections

QUESTION NO: 14
Which of the following is used to ensure that evidence is admissible in legal proceedings when it is collected and provided to the authorities?

A. Chain of custody B. Legal hold C. Artifacts D. Event log

QUESTION NO: 15
A company wants to improve end users experiences when they tog in to a trusted partner website The company does not want the users to be issued separate credentials for the partner website Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?

A. Directory service B. Federation C. Multifactor authentication D. AAA server

QUESTION NO: 16
Which of the following would BEST provide detective and corrective controls for thermal regulation?

A. A smoke detector B. A fire suppression system C. Guards D. A fire alarm E. An HVAC system

Correct Answer: E

Explanation: (Only visible for Pass4Test members)

QUESTION NO: 17
A security administrator is analyzing the corporate wireless network The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate access ports Which of the following attacks in happening on the corporate network?

A. Man in the middle B. Rogue access point C. Disassociation D. Jamming E. Evil twin

QUESTION NO: 18
An attacker browses a company's online job board attempting to find any relevant information regarding the technologies the company uses. Which of the following BEST describes this social engineering technique?

A. Impersonation B. Hoax C. Reconnaissance D. pretexting