Question 141

A user received an invalid password response when trying to change the password. Which of the following policies could explain why the password is invalid?
  • Question 142

    The SOC has received reports of slowness across all workstation network segments. The currently installed antivirus has not detected anything, but a different anti-malware product was just downloaded and has revealed a worm is spreading Which of the following should be the NEXT step in this incident response?
  • Question 143

    You are a cybersecurity analyst tasked with interpreting scan data from Company A's servers. You must verify the requirements are being met for all of the servers and recommend changes if you find they are not.
    The company's hardening guidelines indicate the following:
    * TLS 1.2 is the only version of TLS running.
    * Apache 2.4.18 or greater should be used.
    * Only default ports should be used.
    INSTRUCTIONS
    Using the supplied data, record the status of compliance with the company's guidelines for each server.
    The question contains two parts: make sure you complete Part 1 and Part 2. Make recommendations for issues based ONLY on the hardening guidelines provided.




  • Question 144

    A development team is testing a new application release. The team needs to import existing client PHI data records from the production environment to the test environment to test accuracy and functionality.
    Which of the following would BEST protect the sensitivity of this data while still allowing the team to perform the testing?
  • Question 145

    A company's security administrator needs to automate several security processes related to testing for the existence of changes within the environment Conditionally other processes will need to be created based on input from prior processes Which of the following is the BEST method for accomplishing this task?