Which of the following relets to applications and systems that are used within an organization without consent or approval?
Which of the following relets to applications and systems that are used within an organization without consent or approval?A . Shadow ITB . OSINTC . Dark webD . Insider threatsView AnswerAnswer: A
Which of the following attacks has occurred?
A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, While reviewing logs and tool output, the analyst sees the following: Which of the following attacks has occurred?A . IP conflictB . Pass-the-hashC . MAC floodingD . Directory traversalE...
In which of the following risk management strategies would cybersecurity insurance be used?
In which of the following risk management strategies would cybersecurity insurance be used?A . TransferenceB . AvoidanceC . AcceptanceD . MitigationView AnswerAnswer: A
Which of the following should the engineer employ to meet these requirements?
A network engineer needs to build a solution that will allow guests at the company’s headquarters to access the Internet via WiFi. This solution should not allow access to the internal corporate network, but it should require guests to sign off on the acceptable use policy before accessing the Internet....
Which of the following would BEST protect the company from data exfiltration via removable media?
A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...
Which of the following access control schemes would be BEST for the company to implement?
A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...
Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?
Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?A . Least privilegeB . Awareness trainingC . Separation of dutiesD . Mandatory vacationView AnswerAnswer: C
Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?
A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?A . PCI...
Which of the following would BEST assist the company?
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B