Which of the following is the router experiencing?
A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?A . DDoS attackB...
Which of the following BEST describes this process?
A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?A . Continuous deliveryB ....
Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?
An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...
Which of the following ISO standards is certified for privacy?
Which of the following ISO standards is certified for privacy?A . ISO 9001B . ISO 27002C . ISO 27701D . ISO 31000View AnswerAnswer: C Explanation: ISO 27701 also abbreviated as PIMS (Privacy Information Management System) outlines a framework for Personally Identifiable Information (PII) Controllers and PII Processors to manage data...
Which of the following social-engineering techniques was used in this case?
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?A . SPIMB . VishingC . Spear phishingD . SmishingView AnswerAnswer: D
Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to...
Which of the following technologies are being utilized to provide these capabilities?
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies...
Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...
Which of the following should the administrator configure?
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?A . A captive portalB . PSKC . 802.1XD . WPSView AnswerAnswer: C
Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?
A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be...