Which of the following is the purpose of a risk register?

Which of the following is the purpose of a risk register?A . To define the level or risk using probability and likelihoodB . To register the risk with the required regulatory agenciesC . To identify the risk, the risk owner, and the risk measuresD . To formally log the type...

April 16, 2022 No Comments READ MORE +

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C

April 16, 2022 No Comments READ MORE +

A security engineer is setting up passwordless authentication for the first time

DRAG DROP A security engineer is setting up passwordless authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the simulation,...

April 16, 2022 No Comments READ MORE +

Which of the following would MOST likely support the integrity of a voting machine?

Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: B Explanation: “Blockchain technology has a variety of potential applications. It can ensure the integrity and transparency of financial transactions, online voting...

April 15, 2022 No Comments READ MORE +

Which of the following MOST likely occurred?

A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site Upon investigation, a security analyst the identifies the following: • The legitimate websites IP address is 10.1.1.20 and eRecruit local resolves to the IP • The forged...

April 15, 2022 No Comments READ MORE +

Which of the following implementations would be BEST to prevent the issue from reoccurring?

A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications . Which of the following implementations would be BEST to prevent the issue from reoccurring?A . CASBB ....

April 14, 2022 No Comments READ MORE +

Which of the following would MOST likely allow the company to find the cause?

A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet . Which of the following would MOST likely allow the company to find the cause?A . ChecksumsB . WatermarksC . Oder of volatilityD . A log...

April 14, 2022 No Comments READ MORE +

Which of the following BEST describes this type of email?

Joe, an employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm Joe’s identity before sending him the prize . Which of the following BEST describes this type of email?A...

April 14, 2022 No Comments READ MORE +

Which of the following would work BEST to help identify potential vulnerabilities?

An organization is concerned that is hosted web servers are not running the most updated version of the software . Which of the following would work BEST to help identify potential vulnerabilities?A . Hping3 Cs comptia, org Cp 80B . Nc -1 Cv comptia, org Cp 80C . nmp comptia,...

April 14, 2022 No Comments READ MORE +

Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices . Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote...

April 14, 2022 No Comments READ MORE +