A company’s Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company’s developers. Which of the following would be MOST suitable for training the developers’?A . A capture-the-flag competitionB . A phishing simulationC . Physical security trainingD . Baste...Continue reading
An organization’s Chief Security Officer (CSO) wants to validate the business’s involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO MOST likely use?A . An external security assessmentB . A bug bounty programC . A tabletop exerciseD . A red-team engagement View Answer Answer:...Continue reading
A Chief Security Office’s (CSO’s) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO’s objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration privileges on fileshares.B ....Continue reading
To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?A . MaaSB . laaSC . SaaSD . PaaS View Answer Answer:...Continue reading
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option D View Answer Answer:...Continue reading
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000 View Answer Answer: C...
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to...Continue reading
Which of the following will MOST likely cause machine learning and Al-enabled systems to operate with unintended consequences?A . Stored proceduresB . Buffer overflowsC . Data biasD . Code reuse View Answer Answer: C Explanation: https://lionbridge.ai/articles/7-types-of-data-bias-in-machine-learning/...
A company recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive data. Which of the following should a security engineer do to prevent such an attack in the future?A . Use password hashing.B . Enforce password complexity.C . Implement...Continue reading
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?A . Date of birthB . FingerprintsC . PIND . TPM View Answer Answer: B...