A security engineer needs to implement the following requirements:
All Layer 2 switches should leverage Active Directory for authentication.
All Layer 2 switches should use local fallback authentication of Active Directory is offline. All Layer 2 switches are not
the same and are manufactured by several vendors.
Which of the following actions should the engineer take to meet these requirements? (Choose two.)
A C
A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan
process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems.
Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the
organizations security posture?
D
The website http://companywebsite.com requires users to provide personal information, including security question
responses, for registration. Which of the following would MOST likely cause a data breach?
C
A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the
early detection of attacks. The security analyst then reviews the following application log:
Which of the following can the security analyst conclude?
C
A network engineer is troubleshooting wireless network connectivity issues that were reported by users. The issues are
occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow
speeds when accessing websites and are unable to connect to network drives. The issues appear to increase when laptop
users return to their desks after using their devices in other areas of the building. There have also been reports of users
being required to enter their credentials on web pages in order to gain access to them. Which of the following is the MOST
likely cause of this issue?
A
A security administrator currently spends a large amount of time on common security tasks, such as report generation,
phishing investigations, and user provisioning and deprovisioning. This prevents the administrator from spending time on
other security projects. The business does not have the budget to add more staff members. Which of the following should
the administrator attempt?
D
Explanation:
Reference: https://searchsecurity.techtarget.com/definition/SOAR
A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the
following would be BEST to help the organizations executives determine their next course of action?
D
In which of the following risk management strategies would cybersecurity insurance be used?
A
A security administrator checks the table of a network switch, which shows the following output:
Which of the following is happening to this switch?
A
Explanation:
Reference: http://cisco.num.edu.mn/CCNA_R&S2/course/module2/2.2.2.1/2.2.2.1.html
Which of the following are requirements that must be configured for PCI DSS compliance? (Choose two.)
B D