Which of the following does the business’s IT manager need to consider?

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business’s IT manager need to consider?A . The availability of personal dataB . The right to personal data erasureC . The company’s annual...

March 18, 2022 No Comments READ MORE +

Which of the following controls would be BEST for the analyst to recommend?

A security is assisting the marketing department with ensuring the security of the organization’s social media platforms. The two main concerns are: The Chief marketing officer (CMO) email is being used department wide as the username The password has been shared within the department Which of the following controls would...

March 18, 2022 No Comments READ MORE +

Which of the following commands would be the BEST to run to view only active Internet connections?

A security analyst is reviewing network connectivity on a Linux workstation and examining the active TCP connections using the command line. Which of the following commands would be the BEST to run to view only active Internet connections?A . sudo netstat -antu | grep “LISTEN” | awk ‘{print$5}’B . sudo...

March 17, 2022 No Comments READ MORE +

Which of the following is an appropriate security control the company should implement?

A company suspects a web server may have been infiltrated by a rival corporation. The security engineer reviews the web server logs and finds the following: The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:...

March 17, 2022 No Comments READ MORE +

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. Which of...

March 17, 2022 No Comments READ MORE +

Which of the following techniques should be used?

A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements: Be efficient at protecting the production environment Not require any change to the application Act at the presentation layer Which of the following techniques should be used?A . MaskingB ....

March 16, 2022 No Comments READ MORE +

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.A . Impalement application whitelisting and...

March 16, 2022 No Comments READ MORE +

Which of the following are risks associated with vendor lock-in? (Choose two.)

Which of the following are risks associated with vendor lock-in? (Choose two.)A . The client can seamlessly move data.B . The vendor can change product offerings.C . The client receives a sufficient level of service.D . The client experiences decreased quality of service.E . The client can leverage a multicloud...

March 16, 2022 No Comments READ MORE +

Which of the following would enable the engineer to interpret the results in a human readable form?

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL. Results document as output . Which of the following would enable the engineer to interpret the results in a human readable form? (Select TWO.)A . Text editorB . OOXML editorC . Event ViewerD . XML style sheetE...

March 15, 2022 No Comments READ MORE +

Which of the following be the FIRST step taken by the team?

A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative, the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be...

March 15, 2022 No Comments READ MORE +