Which of the following solutions would BEST support the policy?

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices . Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A

February 25, 2022 No Comments READ MORE +

Which of the following is the purpose of a risk register?

Which of the following is the purpose of a risk register?A . To define the level or risk using probability and likelihoodB . To register the risk with the required regulatory agenciesC . To identify the risk, the risk owner, and the risk measuresD . To formally log the type...

February 25, 2022 No Comments READ MORE +

Which of the following social-engineering techniques was used in this case?

A user recent an SMS on a mobile phone that asked for bank delays . Which of the following social-engineering techniques was used in this case?A . SPIMB . VishingC . Spear phishingD . SmishingView AnswerAnswer: D

February 25, 2022 No Comments READ MORE +

Which of the following should the engineer employ to meet these requirements?

A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet...

February 24, 2022 No Comments READ MORE +

Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices . Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote...

February 24, 2022 No Comments READ MORE +

Which of the following would MOST likely allow the company to find the cause?

A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet . Which of the following would MOST likely allow the company to find the cause?A . ChecksumsB . WatermarksC . Oder of volatilityD . A log...

February 24, 2022 No Comments READ MORE +

Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop?

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports . Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)A . Trusted Platform ModuleB . A host-based...

February 24, 2022 No Comments READ MORE +

Which of the following BEST describes this type of email?

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize . Which of the following BEST describes this type of email?A...

February 24, 2022 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems . Which of the following actions will BEST allow the PII to...

February 24, 2022 No Comments READ MORE +

Which of the following would BEST assist the company?

A small company that does not have security staff wants to improve its security posture . Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B

February 24, 2022 No Comments READ MORE +