- (Exam Topic 2)
A cyber-security administrator is using an enterprise firewall. The administrator created some rules, but now Seems to be unresponsive. All connections being dropped by the firewall. Which of the following would be the BEST option to remove the rules?
Correct Answer:
A
- (Exam Topic 5)
A company recently expenenced an attack dunng which #5 main website was directed to the atacker’s web server, allowing the attacker to harvest credentials from unsuspecting customers. Vhich of the following snould the company Implement to prevent this type of attack from accurting in the future?
Correct Answer:
B
- (Exam Topic 2)
Which of the following BEST describes when an organization utilizes a ready-to-use application from a cloud provider?
Correct Answer:
B
SaaS, or software as a service, is on-demand access to ready-to-use, cloud-hosted application software. https://www.ibm.com/cloud/learn/iaas-paas-saas
- (Exam Topic 5)
Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).
Correct Answer:
AD
- (Exam Topic 2)
An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?
Correct Answer:
D