Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...

March 4, 2021 No Comments READ MORE +

Which of the following solutions will BEST meet these requirements?

A company has decided to move its operations to the cloud. It wants to utilize technology that will prevent users from downloading company applications for personal use, restrict data that is uploaded, and have visibility into which applications are being used across the company. Which of the following solutions will...

March 4, 2021 No Comments READ MORE +

Which of the following steps should also be taken to harden the smart switch?

A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The...

March 4, 2021 No Comments READ MORE +

Which of the following should the IT administrator do FIRST after recovery?

A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do...

March 4, 2021 No Comments READ MORE +

Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC ....

March 4, 2021 No Comments READ MORE +

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?A . Data encryptionB . Data maskingC . AnonymizationD . TokenizationView AnswerAnswer: A

March 4, 2021 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

February 12, 2021 No Comments READ MORE +

Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...

February 12, 2021 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...

February 11, 2021 No Comments READ MORE +

Which of the following control sets should a well-written BCP include? (Select THREE)

Which of the following control sets should a well-written BCP include? (Select THREE)A . PreventiveB . DetectiveC . DeterrentD . CorrectiveE . CompensatingF . PhysicalG . RecoveryView AnswerAnswer: A,D,G

February 11, 2021 No Comments READ MORE +