Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer. Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?A . Implement packet filtering on the network...

August 17, 2021 No Comments READ MORE +

Who in the organization is accountable for classification of data information assets?

Topic 3, . Security Architecture and Engineering Who in the organization is accountable for classification of data information assets?A . Data ownerB . Data architectC . Chief Information Security Officer (CISO)D . Chief Information Officer (CIO)View AnswerAnswer: A

August 16, 2021 No Comments READ MORE +

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?A . Hardware and software compatibility issuesB . Applications’ critically and downtime toleranceC . Budget constraints and requirementsD . Cost/benefit analysis and business objectivesView AnswerAnswer: D

August 16, 2021 No Comments READ MORE +

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?

What should be the FIRST action to protect the chain of evidence when a desktop computer is involved?A . Take the computer to a forensic labB . Make a copy of the hard driveC . Start documentingD . Turn off the computerView AnswerAnswer: C

August 16, 2021 No Comments READ MORE +

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?

Which of the following actions will reduce risk to a laptop before traveling to a high risk area?A . Examine the device for physical tamperingB . Implement more stringent baseline configurationsC . Purge or re-image the hard disk driveD . Change access codesView AnswerAnswer: D

August 16, 2021 No Comments READ MORE +

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions that

All of the following items should be included in a Business Impact Analysis (BIA) questionnaire EXCEPT questions thatA . determine the risk of a business interruption occurringB . determine the technological dependence of the business processesC . Identify the operational impacts of a business interruptionD . Identify the financial impacts...

August 16, 2021 No Comments READ MORE +

Which one of the following describes granularity?

Which one of the following describes granularity?A . Maximum number of entries available in an Access Control List (ACL)B . Fineness to which a trusted system can authenticate usersC . Number of violations divided by the number of total accessesD . Fineness to which an access control system can be...

August 16, 2021 No Comments READ MORE +

What is the ultimate objective of information classification?

What is the ultimate objective of information classification?A . To assign responsibility for mitigating the risk to vulnerable systemsB . To ensure that information assets receive an appropriate level of protectionC . To recognize that the value of any item of information may change over timeD . To recognize the...

August 16, 2021 No Comments READ MORE +

What kind of reading material is MOST relevant to this project?

A security consultant has been asked to research an organization's legal obligations to protect privacy-related information. What kind of reading material is MOST relevant to this project?A . The organization's current security policies concerning privacy issuesB . Privacy-related regulations enforced by governing bodies applicable to the organizationC . Privacy best...

August 15, 2021 No Comments READ MORE +

By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), the

By allowing storage communications to run on top of Transmission Control Protocol/Internet Protocol (TCP/IP) with a Storage Area Network (SAN), theA . confidentiality of the traffic is protected.B . opportunity to sniff network traffic exists.C . opportunity for device identity spoofing is eliminated.D . storage devices are protected against availability...

August 15, 2021 No Comments READ MORE +