The lessons-learned analysis from a recent incident reveals that an administrative office worker received a call from someone claiming to be from technical support. The caller convinced the office worker to visit a website, and then download and install a program masquerading as an antivirus package. The program was actually a backdoor that an attacker could later use to remote control the worker's PC. Which of the following would be BEST to help prevent this type of attack in the future?
c
The process of passively gathering information prior to launching a cyberattack is called:
b
A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the companys server:
Which of the following BEST describes this kind of attack?
a
Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?
c
Which of the following would be used to find the MOST common web-application vulnerabilities?
a
A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?
c
Reference:
https://en.wikipedia.org/wiki/Homomorphic_encryption
Which of the following is the correct order of volatility from MOST to LEAST volatile?
b
A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?
b
A technician is setting up a new firewall on a network segment to allow web traffic to the internet while hardening the network. After the firewall is configured, users receive errors stating the website could not be located. Which of the following would best correct the issue?
d
A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avoid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
d