Which of the following communication methods would be BEST to recommend?

The Chief Executive Officers (CEOs) from two different companies are discussing the highly sensitive prospect of merging their respective companies together. Both have invited their Chief Information Officers (CIOs) to discern how they can securely and digitally communicate, and the following criteria are collectively determined: ✑ Must be encrypted on...

November 10, 2021 No Comments READ MORE +

Which of the following technical options would provide the MOST preventive value?

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and...

November 10, 2021 No Comments READ MORE +

Which of the following MOST likely explains the nature of the incident that caused the organization to implement this remediation?

An organization implemented a secure boot on its most critical application servers which produce content and capability for other consuming servers A recent incident, however led the organization to implement a centralized attestation service for these critical servers . Which of the following MOST likely explains the nature of the...

November 10, 2021 No Comments READ MORE +

Which of the following would MOST likely prevent a similar breach in the future?

While conducting online research about a company to prepare for an upcoming penetration test, a security analyst discovers detailed financial information on an investor website the company did not make public. The analyst shares this information with the Chief Financial Officer (CFO), who confirms the information is accurate, as it...

November 10, 2021 No Comments READ MORE +

To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online?

An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in...

November 10, 2021 No Comments READ MORE +

To determine which controls to implement, which of the following is the MOST important to consider?

An information security manager conducted a gap analysis, which revealed a 75% implementation of security controls for high-risk vulnerabilities, 90% for medium vulnerabilities, and 10% for low-risk vulnerabilities. To create a road map to close the identified gaps, the assurance team reviewed the likelihood of exploitation of each vulnerability and...

November 9, 2021 No Comments READ MORE +

Which of the following conclusions could the CISO draw from the analysis?

A Chief Information Security Officer (CISO) is reviewing the results of a gap analysis with an outside cybersecurity consultant. The gap analysis reviewed all procedural and technical controls and found the following: ✑ High-impact controls implemented: 6 out of 10 ✑ Medium-impact controls implemented: 409 out of 472 ✑ Low-impact...

November 9, 2021 No Comments READ MORE +

Which of the following BEST describes the contents of the supporting document the engineer is creating?

A security engineer is working with a software development team. The engineer is tasked with ensuring all security requirements are adhered to by the developers . Which of the following BEST describes the contents of the supporting document the engineer is creating?A . A series of ad-hoc tests that each...

November 9, 2021 No Comments READ MORE +

Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible as evidence?

During a criminal investigation, the prosecutor submitted the original hard drive from the suspect’s computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected . Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible...

November 9, 2021 No Comments READ MORE +

Which of the following is the CISO looking to improve?

A Chief Information Security Officer (CISO) is reviewing the controls in place to support the organization’s vulnerability management program. The CISO finds patching and vulnerability scanning policies and procedures are in place. However, the CISO is concerned the organization is siloed and is not maintaining awareness of new risks to...

November 9, 2021 No Comments READ MORE +