Which of the following data security controls would work BEST to prevent real Pll from being used in an organization's test cloud environment?

Which of the following data security controls would work BEST to prevent real Pll from being used in an organization's test cloud environment?A . Digital rights managementB . EncryptionC . Access controlD . Data loss preventionE . Data maskingView AnswerAnswer: E

January 21, 2022 No Comments READ MORE +

Which of the following would be the MOST effective way for the security team to meet these objectives?

The security team at a large corporation is helping the payment-processing team to prepare for a regulatory compliance audit and meet the following objectives: ✑ Reduce the number of potential findings by the auditors. ✑ Limit the scope of the audit to only devices used by the payment-processing team for...

January 20, 2022 No Comments READ MORE +

Which of the following lines of PowerShell script will allow a user to extract the last 10.000 lines of the loq for review?

Massivelog log has grown to 40GB on a Windows server At this size, local tools are unable to read the file, and it cannot be moved off the virtual server where it is located. Which of the following lines of PowerShell script will allow a user to extract the last...

January 20, 2022 No Comments READ MORE +

In addition to retraining the employee, which of the following would prevent this from happening in the future?

An employee in the billing department accidentally sent a spreadsheet containing payment card data to a recipient outside the organization. The employee intended to send the spreadsheet to an internal staff member with a similar name and was unaware of the mistake until the recipient replied to the message. In...

January 20, 2022 No Comments READ MORE +

Which of the following are components of the intelligence cycle? (Select TWO.)

Which of the following are components of the intelligence cycle? (Select TWO.)A . CollectionB . NormalizationC . ResponseD . AnalysisE . CorrectionF . DissensionView AnswerAnswer: B,E

January 20, 2022 No Comments READ MORE +

Which of the following describes the access management policy in place at the company?

A company’s senior human resources administrator left for another position, and the assistant administrator was promoted into the senior position. On the official start day, the new senior administrator planned to ask for extended access permissions but noticed the permissions were automatically granted on that day. Which of the following...

January 20, 2022 No Comments READ MORE +

Which of the following BEST describes the reason why the email was blocked?

A security analyst is reviewing the following log from an email security service. Which of the following BEST describes the reason why the email was blocked? A. The To address is invalid. B. The email originated from the www.spamfilter.org URL. C. The IP address and the remote server name are...

January 20, 2022 No Comments READ MORE +

Which of the following describes the type of threat actors that should concern the security analyst?

A security analyst receives an alert to expect increased and highly advanced cyberattacks originating from a foreign country that recently had sanctions implemented. Which of the following describes the type of threat actors that should concern the security analyst?A . HacktivistB . Organized crimeC . Insider threatD . Nation-stateView AnswerAnswer:...

January 20, 2022 No Comments READ MORE +

Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?

A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim. Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?A...

January 20, 2022 No Comments READ MORE +

Which of the following should be considered FIRST prior to disposing of the electronic data?

An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policyB . Data sovereigntyC . Encryption policyD . Retention standardsView AnswerAnswer: D

January 19, 2022 No Comments READ MORE +