Which of the following controls should the security engineer configure?

A security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices the following requirements must be met: • Mobile device OSs must be patched up to the latest...

March 12, 2021 No Comments READ MORE +

Which of the following can the security analyst conclude?

A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log: Which of the following can the security analyst conclude?A . A replay attack is being...

March 11, 2021 No Comments READ MORE +

Which of the following social-engineering attacks does this describe?

An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com. The attacker's intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users. Which of the following social-engineering attacks does this describe?A . Information elicitationB ....

March 11, 2021 No Comments READ MORE +

Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...

March 11, 2021 No Comments READ MORE +

Which of the following describes the BEST approach for deploying application patches?

Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...

March 11, 2021 No Comments READ MORE +

Which of the following BEST represents this type of threat?

The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls. Which of the following BEST represents this type of threat?A . A script kiddieB . Shadow ITC . HacktivismD . White-hatView AnswerAnswer: B

March 11, 2021 No Comments READ MORE +

Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?A . MTBFB . RPOC...

March 10, 2021 No Comments READ MORE +

Which of the following types of controls should be used to reduce the risk created by this scenario?

A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard. Which of the following types of...

March 10, 2021 No Comments READ MORE +

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?

Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?A . InvestigationB . ContainmentC . RecoveryD . Lessons learnedView AnswerAnswer: B

March 10, 2021 No Comments READ MORE +

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?A . TokenizationB . Data maskingC . NormalizationD . ObfuscationView AnswerAnswer: C

March 10, 2021 No Comments READ MORE +