A) The scan job is scheduled to run during off-peak hours.
B) The scan output lists SQL injection attack vectors.
C) The scan data identifies the use of privileged-user credentials.
D) The scan results identify the hostname and IP address.
Correct Answer
verified
Multiple Choice
A) Symmetric algorithm
B) Hash function
C) Digital signature
D) Obfuscation
Correct Answer
verified
Multiple Choice
A) Onetime passwords
B) Email tokens
C) Push notifications
D) Hardware authentication
Correct Answer
verified
Multiple Choice
A) It improves the legal defensibility of the company.
B) It gives a social defense that the company is not violating customer privacy laws.
C) It proves to investors that the company takes APT cyber actors seriously
D) It results in overall industrial security standards being raised voluntarily.
Correct Answer
verified
Multiple Choice
A) Hacktivist
B) White hat hacker
C) Script kiddle
D) Penetration tester
Correct Answer
verified
Multiple Choice
A) Containerization
B) FDE
C) Remote wipe capability
D) MDM
E) MFA
F) OTA updates
Correct Answer
verified
Multiple Choice
A) BCRYPT
B) ECDHE
C) Elliptic curve
D) Diffie-Hellman
Correct Answer
verified
Multiple Choice
A) Internal threat assessment
B) Privacy impact assessment
C) Qualitative risk assessment
D) Supply chain assessment
Correct Answer
verified
Multiple Choice
A) EAP-TLS
B) WPS
C) PSK
D) PEAP
Correct Answer
verified
Multiple Choice
A) Virtual network segmentation
B) Physical network segmentation
C) Site-to-site VPN
D) Out-of-band access
E) Logical VLANs
Correct Answer
verified
Multiple Choice
A) Use a vulnerability scanner.
B) Use a configuration compliance scanner.
C) Use a passive, in-line scanner.
D) Use a protocol analyzer.
Correct Answer
verified
Multiple Choice
A) Monitor VPN client access
B) Reduce failed login out settings
C) Develop and implement updated access control policies
D) Review and address invalid login attempts
E) Increase password complexity requirements
F) Assess and eliminate inactive accounts
Correct Answer
verified
Multiple Choice
A) WPA+CCMP
B) WPA2+CCMP
C) WPA+TKIP
D) WPA2+TKIP
Correct Answer
verified
Multiple Choice
A) MTBF
B) MTTR
C) RTO
D) RPO
Correct Answer
verified
Multiple Choice
A) nslookup comptia.org set type=ANY ls-d example.org
B) set type=MX example.org
C) dig -axfr comptia.org@example.org
D) ipconfig/flushDNS
E) ifconfig eth0 down ifconfig eth0 up dhclient renew
F) dig@example.org comptia.org
Correct Answer
verified
Multiple Choice
A) Mean RTO
B) Mean RPO
C) Data sovereignty
D) Data destruction laws
E) Backup media recycling policies
Correct Answer
verified
Multiple Choice
A) Command injection
B) Password attack
C) Buffer overflow
D) Cross-site scripting
Correct Answer
verified
Multiple Choice
A) Monitor VPN client access
B) Reduce failed login out settings
C) Develop and implement updated access control policies
D) Review and address invalid login attempts
E) Increase password complexity requirements
F) Assess and eliminate inactive accounts
Correct Answer
verified
Multiple Choice
A) Document and lock the workstations in a secure area to establish chain of custody
B) Notify the IT department that the workstations are to be reimaged and the data restored for reuse
C) Notify the IT department that the workstations may be reconnected to the network for the users to continue working
D) Document findings and processes in the after-action and lessons learned report
Correct Answer
verified
Multiple Choice
A) Fingerprint, PIN, and mother's maiden name
B) One-time password sent to a smartphone, thumbprint, and home street address
C) Fingerprint, voice recognition, and password
D) Password, one-time password sent to a smartphone, and text message sent to a smartphone
Correct Answer
verified
Showing 141 - 160 of 1164
Related Exams