Question 186
An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the
engineer select to meet these requirements?
engineer select to meet these requirements?
Question 187
A SOC is currently being outsourced. Which of the following is being used?
Question 188
Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following:
Multiple reports of breached credentials within that time period
Traffic being redirected in certain parts of the network
Fraudulent emails being sent by various internal users without their consent
Which of the following types of attacks was MOST likely used?
Multiple reports of breached credentials within that time period
Traffic being redirected in certain parts of the network
Fraudulent emails being sent by various internal users without their consent
Which of the following types of attacks was MOST likely used?
Question 189
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications.
The firm has been given all the developer's documentation about the internal architecture. Which of the following BEST represents the type of testing that will occur?
The firm has been given all the developer's documentation about the internal architecture. Which of the following BEST represents the type of testing that will occur?
Question 190
A security analyst has received an alert about being sent via email. The analyst's Chief information Security Officer (CISO) has made it clear that PII must be handle with extreme care From which of the following did the alert MOST likely originate?