Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?
An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...
Which of the following would MOST likely support the integrity of a voting machine?
Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: D
The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:
The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:A . data controller.B . data ownerC . data custodian.D . data processorView AnswerAnswer: D
Which of the following types of controls should be used to reduce the risk created by this scenario?
A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard. Which of the following types of...
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?A . The document is a honeyfile and is meant to attract the attention of a cyberintruder.B . The document is a backup...
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?A . An SLAB . AnNDAC . ABPAD . AnMOUView AnswerAnswer: D
Which of the following sources would reveal if the CEO's personal information is for sale?
A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?A . Automated information sharingB . Open-source intelligenceC . The dark webD . Vulnerability databasesView AnswerAnswer: C
Which of the following MDM configurations must be considered when the engineer travels for business?
An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?A . Screen locksB . Application managementC . GeofencingD . ContainerizationView AnswerAnswer: D
Which of the following files should be given to the forensics firm?
A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?A . SecurityB . ApplicationC . DumpD . SyslogView...