Which of the following is an appropriate security control the company should implement?

A company suspects a web server may have been infiltrated by a rival corporation. The security engineer reviews the web server logs and finds the following: The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:...

March 17, 2022 No Comments READ MORE +

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. Which of...

March 17, 2022 No Comments READ MORE +

Which of the following techniques should be used?

A company is looking for a solution to hide data stored in databases. The solution must meet the following requirements: Be efficient at protecting the production environment Not require any change to the application Act at the presentation layer Which of the following techniques should be used?A . MaskingB ....

March 16, 2022 No Comments READ MORE +

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.A . Impalement application whitelisting and...

March 16, 2022 No Comments READ MORE +

Which of the following are risks associated with vendor lock-in? (Choose two.)

Which of the following are risks associated with vendor lock-in? (Choose two.)A . The client can seamlessly move data.B . The vendor can change product offerings.C . The client receives a sufficient level of service.D . The client experiences decreased quality of service.E . The client can leverage a multicloud...

March 16, 2022 No Comments READ MORE +

Which of the following would enable the engineer to interpret the results in a human readable form?

A cybersecurity engineer analyst a system for vulnerabilities. The tool created an OVAL. Results document as output . Which of the following would enable the engineer to interpret the results in a human readable form? (Select TWO.)A . Text editorB . OOXML editorC . Event ViewerD . XML style sheetE...

March 15, 2022 No Comments READ MORE +

Which of the following be the FIRST step taken by the team?

A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative, the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be...

March 15, 2022 No Comments READ MORE +

Which of the following is a security concern that will MOST likely need to be addressed during migration?

A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . LatencyB . Data exposureC . Data lossD . Data dispersionView AnswerAnswer:...

March 15, 2022 No Comments READ MORE +

Which of the following would be BEST to proceed with the transformation?

A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident. Which of the following would be BEST to proceed with the transformation?A . An on-premises solution as a backupB . A load balancer with...

March 15, 2022 No Comments READ MORE +