EXAM 2 LATEST VERSIONS QUESTIONS AND
CORRECT ANSWERS| GET 100% CORRECT
SOLUTIONS /ALREADY GRADED A+
a binary file format found mainly in Java environments -
✔✔ANSW✔✔..DER
A company configures workstations only to run software
on an approved list. What is this an example of? -
✔✔ANSW✔✔..allow listing
A company decides to invest in embedded systems to
improve security by limiting the number of components
used in various critical and sensitive systems. Which of
the following would make it more difficult to justify
embedded systems in certain cases? This task contains the
radio buttons and checkboxes for options. Press the enter
key to select the option. option A - ✔✔ANSW✔✔..the
wireless networking range
a format for sharing and archiving certificates without the
private key - ✔✔ANSW✔✔..P7B
,a framework for enterprise risk management -
✔✔ANSW✔✔..31000
a knowledge base of adversary techniques presented as a
matrix for enterprise - ✔✔ANSW✔✔..mitre att&ck
a linear seven step attack model that defenders use to
interrupt the steps and stop the attack -
✔✔ANSW✔✔..cyber kill chain
A manufacturer that relies on purchasing various
components for the fabrication of their finished products
made the decision to work only with suppliers that use a
particular blockchain solution to track individual items
along the supply chain. What is the key feature of a
private blockchain that assures the manufacturer that the
status transformation of any given component along its
journey cannot be forged or corrupted, ensuring all status
updates are verified accurately? - ✔✔ANSW✔✔..the
public ledger
A network technician has been asked to troubleshoot
recently observed performance issues as well as the root
cause of new alerts regarding network traffic anomalies.
Which monitoring tool should the technician choose first
,to troubleshoot both problems? -
✔✔ANSW✔✔..bandwidth monitor
A secure records room installed a new iris scanner,
chosen for its low crossover error rate. What does that
mean it has? - ✔✔ANSW✔✔..Low FRR (false rejection
rate) & low FAR (false acceptance rate)
A security program alerts you of a failed login attempt to
a secure system. On investigation, you learn the system's
regular user accidentally had caps lock turned on. What
kind of alert was it? - ✔✔ANSW✔✔..false positive
A user complains that after entering a URL into a
browser, what appeared to be the correct page is displayed
in the browser. However, after clicking a few links on the
page, it became obvious that the site the user arrived at
was not the correct site, but instead a malicious copy of
the site the user intended to visit. Which of the following
attacks did the user most likely fall prey to? -
✔✔ANSW✔✔..typosquatting
A user complains that every time they open their Internet
browser, it no longer goes to their preferred home page,
and advertisements pop up in dialog boxes that they have
to close. What is the likely cause? -
✔✔ANSW✔✔..spyware
, a very popular Base-64 ASCII-encoded file format -
✔✔ANSW✔✔..PEM
ACLs that are secure by default are based on which
assumption? - ✔✔ANSW✔✔..implicit deny
After a security incident, you rush to take a screenshot of
a telltale running process before you leisurely take a
backup of suspicious files on the hard drive. What
forensic principle are you exercising? -
✔✔ANSW✔✔..Order of Volatility
After finishing a full antimalware scan on all drives in a
server, a technician is convinced an infection of some sort
persists. Which of the following malware variants would
have evaded the scan that was performed? -
✔✔ANSW✔✔..fileless virus
After having trouble navigating to a webpage on the
Internet, resulting in a privacy error, you inspect the site's
certificate and notice the chain of certificates contains
three nodes, one being the leaf certificate of the site you
are attempting to reach. You inspect the root certificate
and find that your operating system stores an exact match
for it locally and, therefore, it and your browser trust it
explicitly. Which of the following actions might solve the