- (Exam Topic 5)
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:
Correct Answer:
A
- (Exam Topic 4)
An organization has implemented a two-step verification process to protect user access to data that s stored in the coud Ic scssnncsitcibin a vdiemiietanebins code to access the data. Which of the following authentication methods did the organization implement?
Correct Answer:
A
- (Exam Topic 1)
A security analyst is evaluating solutions to deploy an additional layer of protection for a web application The goal is to allow only encrypted communications without relying on network devices Which of the following can be implemented?
Correct Answer:
C
- (Exam Topic 1)
Which of the following is a benefit of including a risk management framework into an organization's security approach?
Correct Answer:
D
- (Exam Topic 1)
A security analyst has been asked by the Chief Information Security Officer to
• develop a secure method of providing centralized management of infrastructure
• reduce the need to constantly replace aging end user machines
• provide a consistent user desktop expenence
Which of the following BEST meets these requirements?
Correct Answer:
C