Which of the following should the company use to prevent data theft?

A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs. Which of the following should the company use to prevent data theft?A . WatermarkingB . DRMC . NDAD . Access loggingView AnswerAnswer: B Explanation: DRM (digital rights management) is a technology that...

March 23, 2025 No Comments READ MORE +

Which of the following would be the BEST option to implement?

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not...

March 23, 2025 No Comments READ MORE +

Which of the following should the security analyst perform?

A security analyst is investigating a series of suspicious emails by employees to the security team. The email appear to come from a current business partner and do not contain images or URLs. No images or URLs were stripped from the message by the security tools the company uses instead,...

March 21, 2025 No Comments READ MORE +

Which of the following is the NEXT step the analyst should take after reporting the incident to the management team?

While investigating a security event, an analyst finds evidence that a user opened an email attachment from an unknown source. Shortly after the user opened the attachment, a group of servers experienced a large amount of network and resource activity. Upon investigating the servers, the analyst discovers the servers were...

March 21, 2025 No Comments READ MORE +

Which of the following commands would be the BEST to run to view only active Internet connections?

A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line. Which of the following commands would be the BEST to run to view only active Internet connections?A . sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’B . sudo...

March 20, 2025 No Comments READ MORE +

Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?

A security engineer was auditing an organization’s current software development practice and discovered that multiple open-source libraries were Integrated into the organization’s software. The organization currently performs SAST and DAST on the software it develops. Which of the following should the organization incorporate into the SDLC to ensure the security...

March 19, 2025 No Comments READ MORE +

Which of the following is the BEST solution for this company?

A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company’s website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option. Which...

March 17, 2025 No Comments READ MORE +

Company A is establishing a contractual with Company

Company A is establishing a contractual with Company B. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights. Which of the following documents will MOST likely contain these elementsA . Company A-B SLA v2.docxB . Company A OLA...

March 16, 2025 No Comments READ MORE +

Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users. Which of the following would be BEST for the developer to perform? (Choose two.)A . Utilize code signing by a trusted third party.B . Implement certificate-based authentication.C ....

March 14, 2025 No Comments READ MORE +

Which of the following would be the BEST solution against this type of attack?

A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks. Which of the following would be the BEST solution against this...

March 13, 2025 No Comments READ MORE +