Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?

Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?A . Role Based Access Control (RBAC)B . Biometric access controlC . Federated Identity Management (IdM)D . Application hardeningView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Which of the following is the FIRST step in the incident response process?

Which of the following is the FIRST step in the incident response process?A . Determine the cause of the incidentB . Disconnect the system involved from the networkC . Isolate and contain the system involvedD . Investigate all symptoms to confirm the incidentView AnswerAnswer: D

March 20, 2021 No Comments READ MORE +

In which of the following programs is it MOST important to include the collection of security process data?

In which of the following programs is it MOST important to include the collection of security process data?A . Quarterly access reviewsB . Security continuous monitoringC . Business continuity testingD . Annual security trainingView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

Which of the following is a PRIMARY advantage of using a third-party identity service?

Which of the following is a PRIMARY advantage of using a third-party identity service?A . Consolidation of multiple providersB . Directory synchronizationC . Web based logonD . Automated account managementView AnswerAnswer: D

March 20, 2021 No Comments READ MORE +

Which of the following mobile code security models relies only on trust?

Which of the following mobile code security models relies only on trust?A . Code signingB . Class authenticationC . SandboxingD . Type safetyView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

What MUST an administrator review to audit a user’s access to data files?

A Virtual Machine (VM) environment has five guest Operating Systems (OS) and provides strong isolation. What MUST an administrator review to audit a user’s access to data files?A . Host VM monitor audit logsB . Guest OS access controlsC . Host VM access controlsD . Guest OS audit logsView AnswerAnswer:...

March 20, 2021 No Comments READ MORE +

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?

Which of the following operates at the Network Layer of the Open System Interconnection (OSI) model?A . Packet filteringB . Port services filteringC . Content filteringD . Application access controlView AnswerAnswer: A

March 20, 2021 No Comments READ MORE +

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?

With what frequency should monitoring of a control occur when implementing Information Security Continuous Monitoring (ISCM) solutions?A . Continuously without exception for all security controlsB . Before and after each change of the controlC . At a rate concurrent with the volatility of the security controlD . Only during system...

March 19, 2021 No Comments READ MORE +

What would be the MOST probable cause?

An organization is found lacking the ability to properly establish performance indicators for its Web hosting solution during an audit. What would be the MOST probable cause?A . Absence of a Business Intelligence (BI) solutionB . Inadequate cost modelingC . Improper deployment of the Service-Oriented Architecture (SOA)D . Insufficient Service...

March 19, 2021 No Comments READ MORE +

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?

Which Hyper Text Markup Language 5 (HTML5) option presents a security challenge for network data leakage prevention and/or monitoring?A . Cross Origin Resource Sharing (CORS)B . WebSocketsC . Document Object Model (DOM) treesD . Web Interface Definition Language (IDL)View AnswerAnswer: B

March 19, 2021 No Comments READ MORE +