Which of the following configuration changes to the existing controls would be the MOST appropriate to improve performance?

A company’s blocklist has outgrown the current technologies in place. The ACLS are at maximum, and the IPS signatures only allow a certain amount of space for domains to be added, creating the need for multiple signatures. Which of the following configuration changes to the existing controls would be the MOST appropriate to improve...

In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?

A Chief Security Officer (CSO) is working on the communication requirements (or an organization’s incident response plan. In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?A . Public relations must receive information promptly in order to notify the...

Which of the following will MOST likely help the security analyst develop better controls?

A company recently experienced financial fraud, which included shared passwords being compromised and improper levels of access being granted. The company has asked a security analyst to help improve its controls. Which of the following will MOST likely help the security analyst develop better controls?A . An evidence summarizationB . An indicator of compromiseC...

Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?

An organization developed a comprehensive incident response policy. Executive management approved the policy and its associated procedures. Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?A . A simulated breach scenario involving the incident response teamB . Completion of annual information security awareness training by all...

Which of the following software security best practices would prevent an attacker from being able to run arbitrary SQL commands within a web application? (Choose two.)

Which of the following software security best practices would prevent an attacker from being able to run arbitrary SQL commands within a web application? (Choose two.)A . Parameterized queriesB . Session managementC . Input validationD . Output encodingE . Data protectionF . Authentication View Answer Answer: A,C Explanation: Reference: https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-prevent-sql-injection-attacks/...