Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?
Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?A . A right-to-audit clause allowing for annual security auditsB . Requirements for event logs to be kept for a minimum of 30 daysC . Integration of...
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?
Which of the following scenarios would make a DNS sinkhole effective in thwarting an attack?A . An attacker is sniffing traffic to port 53, and the server is managed using unencrypted usernames and passwords.B . An organization is experiencing excessive traffic on port 53 and suspects an attacker is trying...
Which of the following stages of the incident response process is this an example of?
A security operations analyst is using the company's SIEM solution to correlate alerts. Which of the following stages of the incident response process is this an example of?A . EradicationB . RecoveryC . IdentificationD . PreparationView AnswerAnswer: C
When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?
When implementing automation with loT devices, which of the following should be considered FIRST to keep the network secure?A . 2-Wave compatibilityB . Network rangeC . Zigbee configurationD . Communication protocolsView AnswerAnswer: D
Which of the following BEST explains the difference between a data owner and a data custodian?
Which of the following BEST explains the difference between a data owner and a data custodian?A . The data owner is responsible for adhering to the rules for using the data, while the data custodian is responsible for determining the corporate governance regarding the dataB . The data owner is...
Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?
An organization relies on third-party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?A . Using geographic diversity to have...
A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all white boars are cleaned and all desks are cleared. The company is...
Which of the following solutions would BEST support the policy?
A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?A . Mobile device managementB . Full-device encryptionC . Remote wipeD . BiometricsView AnswerAnswer: A
Which of the following should the engineer select to meet these requirements?
An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?A . LaptopsB...
Which of the following must be included?
A company is designing the layout of a new datacenter so it will have an optimal environmental temperature. Which of the following must be included? (Select TWO)A . An air gapB . A cold aisleC . Removable doorsD . A hot aisleE . An loT thermostatF . A humidity monitorView...