Which of the following describes what the manager is doing?
A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the...
Which of the following attacks is MOST likely being detected?
A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned . Which...
Which of the following techniques BEST explains this action?
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string . Which of the following techniques BEST explains this action?A . PredictabilityB . Key stretchingC . SaltingD . HashingView AnswerAnswer: C
Which of the following would MOST likely contain that information?
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button . Which of the following would MOST likely contain that information?A . NGFWB . PagefileC . NetFlowD . RAMView AnswerAnswer:...
Which of the following methods would BEST accomplish this goal?
A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process . Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB...
Which of the following ISO standards is certified for privacy?
Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C Explanation: ISO 27701 also abbreviated as PIMS (Privacy Information Management System) outlines a framework for Personally Identifiable Information (PII) Controllers and PII Processors to manage data...
Which of the following demonstrates what the administrator is providing?
After entering a username and password, and administrator must gesture on a touch screen . Which of the following demonstrates what the administrator is providing?A . Multifactor authenticationB . Something you can doC . BiometricD . Two-factor authenticationView AnswerAnswer: D
Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)
Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)A . Unsecure protocolsB . Use of penetration-testing utilitiesC . Weak passwordsD . Included third-party librariesE . Vendors/supply chainF . Outdated anti-malware softwareView AnswerAnswer: D,E
Which of the following is the analyst MOST likely seeing?
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred . Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD ....
Which of the following would be BEST to address the ClO’s concerns?
An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up....