Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A company's antivirus solution is effective in blocking malware but often has false positives. The security team has spent a significant amount of time on investigations but cannot determine a root cause. The company is looking for a heuristic solution. Which of the following should replace the antivirus solution? A. SIEM B. EDR C. DLP D. IDS Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link During a penetration test in a hypervisor A. the security engineer is able to use a script to inject a malicious payload and access the host filesystem. Which of the following best describes this vulnerability? B. VM escape C. Cross-site scripting D. Malicious update E. SQL injection Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do? A. Deploy multifactor authentication. B. Decrease the level of the web filter settings. C. Implement security awareness training. D. Update the acceptable use policy. Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following strategies most effectively protects sensitive data at rest in a database? A. Hashing B. Masking C. Tokenization D. Obfuscation Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link An employee from the accounting department logs in to the website used for processing the company's payments. After logging in A. a new desktop application automatically downloads on the employee's computer and causes the computer to restart. Which of the following attacks has occurred? B. XSS C. Watering hole D. Typosquatting E. Buffer overflow Submit Answer