Which of the following cryptographic techniques would BEST meet the requirement?
A financial institution would like to stare is customer data a could but still allow the data ta he accessed and manipulated while encrypted. Doing se would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concern about...
In which of the following risk management strategies would cybersecurity insurance be used?
In which of the following risk management strategies would cybersecurity insurance be used?A . TransferenceB . AvoidanceC . AcceptanceD . MitigationView AnswerAnswer: A
Which of the following is a risk that is specifically associated with hosting applications in the public cloud?
Which of the following is a risk that is specifically associated with hosting applications in the public cloud?A . Unsecured root accountsB . Zero dayC . Shared tenancyD . Insider threatView AnswerAnswer: C
Preconfigure the client for an incoming guest.
Preconfigure the client for an incoming guest. The guest AD credentials are: User: guest01 Password: guestpass View AnswerAnswer: Use the same settings as describe in below images. Graphical user interface, application Description automatically generated Graphical user interface, text, application, chat or text message Description automatically generated
Which of the following control types does this BEST represent?
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?A . PreventiveB . CompensatingC . CorrectiveD . DetectiveView AnswerAnswer: D
Which of the following BEST describes this process?
A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?A . Continuous deliveryB ....
Which of the following resiliency techniques will provide these capabilities?
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The Oss are still supported by the vendor, but the industrial software is no longer supported. The Chief Information Security Officer (CISO) has created a resiliency plan for...
Which of the following is the MOST likely cause of the issue?
An end user reports a computer has been acting slower than normal for a few weeks. During an investigation, an analyst determines the system is sending the user's email address and a ten-digit number to an IP address once a day. The only recent log entry regarding the user's computer...
Which of the following actions MOST likely supports an investigation for fraudulent submission?
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager darned the reports were previously sent via email but then quickly generated and backdated the reports before submitting them via a new email message. Which of the following actions...
Which of the following can the security analyst conclude?
A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log: Which of the following can the security analyst conclude?A . A replay attack is being...