Which of the following would provide this information?
A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved ....
In the shared responsibility model, which of the following levels of service meets this requirement?
Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts partial responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?A . laaSB . SaaSC . FaaSD...
Which of the following BEST describes this type of contractual document?
An organization requires a contractual document that includes • An overview of what is covered • Goals and objectives • Performance metrics for each party • A review of how the agreement is managed by all parties Which of the following BEST describes this type of contractual document?A . SLAB...
Which of the following techniques would the company use to evaluate data confidentiality controls?
A large telecommunications equipment manufacturer needs to evaluate the strengths of security controls in a new telephone network supporting first responders . Which of the following techniques would the company use to evaluate data confidentiality controls?A . EavesdroppingB . On-pathC . CryptanalysisD . Code signingE . RF sidelobe sniffingView AnswerAnswer:...
Which of the following phases establishes the identification and prioritization of critical systems and functions?
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?A . Review a recent gap analysis.B . Perform a cost-benefit analysis.C . Conduct a business impact...
Which of the following side-channel attacks did the team use?
An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed. Which of the following side-channel attacks did the team use?A . Differential power analysisB . Differential fault analysisC ....
Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents?
An auditor needs to scan documents at rest for sensitive text. These documents contain both text and Images . Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Select TWO).A . Document interpolationB . Regular...
Which of the following steps would be best to perform FIRST?
A host on a company’s network has been infected by a worm that appears to be spreading via SMB. A security analyst has been tasked with containing the incident while also maintaining evidence for a subsequent investigation and malware analysis. Which of the following steps would be best to perform...
Which of the following is a benefit of using steganalysis techniques in forensic response?
UESTION NO: 36 Which of the following is a benefit of using steganalysis techniques in forensic response?A . Breaking a symmetric cipher used in secure voice communicationsB . Determining the frequency of unique attacks against DRM-protected mediaC . Maintaining chain of custody for acquired evidenceD . Identifying least significant bit...
Which of the following controls would reduce the discovery time for similar in the future?
A company in the financial sector receives a substantial number of customer transaction requests via email. While doing a root-cause analysis conceding a security breach, the CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used by a customer relations employee who has...