Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?A . To provide data to quantity risk based on the organization's systems.B . To keep all software and hardware fully patched for known vulnerabilitiesC...
Which of the following sources of information would BEST support this solution?
An incident, which is affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common IoC to support response and recovery actions....
Which of the following is the BEST solution to protect these designs?
A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...
Which of the following BEST describes the type of attack that is occurring?
Given the following logs: Which of the following BEST describes the type of attack that is occurring?A . Rainbow tableB . DictionaryC . Password sprayingD . Pass-the-hashView AnswerAnswer: C
Which of the following is MOST likely causing the malware alerts?
Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS. Which of...
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?A . Red teamB . While teamC . Blue teamD . Purple teamView AnswerAnswer: A
Which of the following is the consultant MOST likely to recommend to prepare for eradication?
An organization hired a consultant to assist with an active attack, and the consultant was able to identify the compromised accounts and computers. Which of the following is the consultant MOST likely to recommend to prepare for eradication?A . Quarantining the compromised accounts and computers, only providing them with network...
Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...
Which of the following should the university use to BEST protect these assets deployed in the facility?
A university is opening a facility in a location where there is an elevated risk of theft. The university wants to protect the desktops in its classrooms and labs. Which of the following should the university use to BEST protect these assets deployed in the facility?A . Visitor logsB ....
Which of the following would BEST meet the CSO's objectives?
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration...