Which of the following will MOST likely secure the data on the lost device?

A company is migrating from company-owned phones to a BYOD strategy for mobile devices. The pilot program will start with the executive management team and be rolled out to the rest of the staff in phases. The company’s Chief Financial Officer loses a phone multiple times a year. Which of...

December 17, 2021 No Comments READ MORE +

Which of the following phases establishes the identification and prioritization of critical systems and functions?

An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items. Which of the following phases establishes the identification and prioritization of critical systems and functions?A . Review a recent gap analysis.B . Perform a cost-benefit analysis.C . Conduct a business impact...

December 16, 2021 No Comments READ MORE +

Which of the following are risks associated with vendor lock-in? (Choose two.)

Which of the following are risks associated with vendor lock-in? (Choose two.)A . The client can seamlessly move data.B . The vendor can change product offerings.C . The client receives a sufficient level of service.D . The client experiences decreased quality of service.E . The client can leverage a multicloud...

December 16, 2021 No Comments READ MORE +

Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements. Which of the following would...

December 16, 2021 No Comments READ MORE +

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...

December 16, 2021 No Comments READ MORE +

Which of the following is a benefit of using steganalysis techniques in forensic response?

Which of the following is a benefit of using steganalysis techniques in forensic response?A . Breaking a symmetric cipher used in secure voice communicationsB . Determining the frequency of unique attacks against DRM-protected mediaC . Maintaining chain of custody for acquired evidenceD . Identifying least significant bit encoding of data...

December 16, 2021 No Comments READ MORE +

Which of the following authentication protocols should the organization implement to support these requirements?

An organization is implementing a new identity and access management architecture with the following objectives: Supporting MFA against on-premises infrastructure Improving the user experience by integrating with SaaS applications Applying risk-based policies based on location Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support...

December 15, 2021 No Comments READ MORE +

Which of the following is the BEST solution for this company?

A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company’s website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option ....

December 15, 2021 No Comments READ MORE +

Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?

An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information. Which of the following provides the BEST guidance for protecting such information while it is at...

December 14, 2021 No Comments READ MORE +

Which of the following will MOST likely be a limiting factor when selecting mobile device managers for the company?

A company that all mobile devices be encrypted, commensurate with the full disk encryption scheme of assets, such as workstation, servers, and laptops . Which of the following will MOST likely be a limiting factor when selecting mobile device managers for the company?A . Increased network latencyB . Unavailable of...

December 14, 2021 No Comments READ MORE +