Which of the following processes can be used to identify potential prevention recommendations?

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . Detection B. Remediation C. Preparation D. RecoveryView AnswerAnswer: A

May 24, 2023 No Comments READ MORE +

Which of the following MOST appropriate corrective action to document for this finding?

A Chief information Security Officer (CISO) is developing corrective-action plans based on the following from a vulnerability scan of internal hosts: Which of the following MOST appropriate corrective action to document for this finding?A . The product owner should perform a business impact assessment regarding the ability to implement a...

May 24, 2023 No Comments READ MORE +

Which of the following would be the BEST option to implement?

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not...

May 23, 2023 No Comments READ MORE +

Which of the following should a security architect recommend?

A recent data breach revealed that a company has a number of files containing customer data across its storage environment. These files are individualized for each employee and are used in tracking various customer orders, inquiries, and issues. The files are not encrypted and can be accessed by anyone. The...

May 23, 2023 No Comments READ MORE +

Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?

A company hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements: The credentials used to publish production software to the container registry should be stored in a secure location. Access should be restricted to the...

May 23, 2023 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization. B. Deploy...

May 23, 2023 No Comments READ MORE +

Which of the following solutions should the security team implement to mitigate the risk of data loss?

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following: Unstructured data being exfiltrated after an employee leaves the...

May 23, 2023 No Comments READ MORE +

Which of the following should the security administrator do to mitigate the risk?

A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the...

May 23, 2023 No Comments READ MORE +

Which of the following should the security engineer do to BEST manage the threats proactively?

A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?A . Join an information-sharing community that is relevant to...

May 23, 2023 No Comments READ MORE +

Which of the following is a security concern that will MOST likely need to be addressed during migration?

A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . Latency B. Data exposure C. Data loss D. Data dispersionView AnswerAnswer:...

May 22, 2023 No Comments READ MORE +