Question 1

The Chief information Officer (CIO) of a large bank, which uses multiple third-party organizations to deliver a service, is concerned about the handling and security of customer data by the parties. Which of the following should be implemented to BEST manage the risk?
  • Question 2

    Following a merger, the number of remote sites for a company hasdoubled to 52. The company has decided to secure each remote site with an NGFW to provide web filtering, NIDS/NIPS, and network antivirus. The Chief Information Officer (CIO) has requested that the security engineer provide recommendations on sizing for the firewall with the requirements that it be easy to manage and provide capacity for growth.
    The tables below provide information on a subset of remote sites and the firewall options:


    Which of the following would be the BEST option to recommend to theCIO?
  • Question 3

    Given the following output from a security tool in Kali:
  • Question 4

    A cybersecurity consulting company supports a diverse customer base. Which of the following types of constraints is MOST important for the consultancy to consider when advising a regional healthcare provider versus a global conglomerate?
  • Question 5

    The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled:
    Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
    Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
    Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
    All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface's MAC is 00-01-42-32-ab-1a A packet capture shows the following:
    09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2305, seq 1, length 65534
    09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2306, seq 2, length 65534
    09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2307, seq 3, length 65534
    Which of the following is occurring on the network?