Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?A . InvestigationB . ContainmentC . RecoveryD . Lessons learnedView AnswerAnswer: B
In which of the following common use cases would steganography be employed?
In which of the following common use cases would steganography be employed?A . ObfuscationB . IntegrityC . Non-repudiationD . BlockchainView AnswerAnswer: A
Which of the following intelligence sources should to security analyst review?
A security analyst needs to be proactive in understand the types of attacks that could potentially target the company's execute . Which of the following intelligence sources should to security analyst review?A . Vulnerability feedsB . Trusted automated exchange of indicator informationC . Structured threat information expressionD . Industry information-sharing...
Which of the following is the MOST likely cause of the CRO’s concerns?
The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed...
Which of the following would be the MOST acceptable?
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft . Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B Explanation: https://ktechproducts.com/Data-mask#:~:text=Data%20Masking%20is%20a%20method%20of%20creating%20a,partial%2 0data%20based%20on%20the%20user%E2%80%99s%20security%20permissions. The main reason for applying masking to a...
Which of the following plans is the organization MOST likely developing?
An organization is developing a plan in the event of a complete loss of critical systems and data . Which of the following plans is the organization MOST likely developing?A . Incident responseB . CommunicationsC . Disaster recoveryD . Data retentionView AnswerAnswer: C
Which of the following BEST describes the tasks the developer is conducting?
A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release . Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A
Which of the following tactics would an attacker MOST likely use in this scenario?
Company engineers regularly participate in a public Internet forum with other engineers throughout the industry . Which of the following tactics would an attacker MOST likely use in this scenario?A . Watering-hole attackB . Credential harvestingC . Hybrid warfareD . PharmingView AnswerAnswer: A
Which of the following BEST describes a security exploit for which a vendor patch is not readily available?
Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B