Which of the following would be the MOST acceptable?

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft . Which of the following would be the MOST acceptable?A . SEDB . HSMC . DLPD . TPMView AnswerAnswer: A

March 6, 2022 No Comments READ MORE +

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?A . Data encryptionB . Data maskingC . Data deduplicationD . Data minimizationView AnswerAnswer: B Explanation: https://ktechproducts.com/Data-mask#:~:text=Data%20Masking%20is%20a%20method%20of%20creating%20a,partial%2 0data%20based%20on%20the%20user%E2%80%99s%20security%20permissions. The main reason for applying masking to a...

March 6, 2022 No Comments READ MORE +

Which of the following plans is the organization MOST likely developing?

An organization is developing a plan in the event of a complete loss of critical systems and data . Which of the following plans is the organization MOST likely developing?A . Incident responseB . CommunicationsC . Disaster recoveryD . Data retentionView AnswerAnswer: C

March 6, 2022 No Comments READ MORE +

Which of the following BEST describes the tasks the developer is conducting?

A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release . Which of the following BEST describes the tasks the developer is conducting?A . VerificationB . ValidationC . NormalizationD . StagingView AnswerAnswer: A

March 6, 2022 1 Comment READ MORE +

Which of the following tactics would an attacker MOST likely use in this scenario?

Company engineers regularly participate in a public Internet forum with other engineers throughout the industry . Which of the following tactics would an attacker MOST likely use in this scenario?A . Watering-hole attackB . Credential harvestingC . Hybrid warfareD . PharmingView AnswerAnswer: A

March 6, 2022 No Comments READ MORE +

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

Which of the following BEST describes a security exploit for which a vendor patch is not readily available?A . Integer overflowB . Zero-dayC . End of lifeD . Race conditionView AnswerAnswer: B

March 6, 2022 No Comments READ MORE +

Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet . Which of the following is the BEST solution to protect these designs?A . An air gapB ....

March 6, 2022 No Comments READ MORE +

Which of the following solutions would meet the requirements?

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: ✑ Check-in/checkout of credentials ✑ . The ability to use but not know the password ✑ Automated password changes ✑ Logging of access to credentials Which of the following solutions would...

March 6, 2022 No Comments READ MORE +

Which of the following is the router experiencing?

A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?A . DDoS attackB...

March 6, 2022 No Comments READ MORE +

Which of the following risk management strategies is this an example of?

When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider . Which of the following risk management strategies is this an example of?A . AcceptanceB . MitigationC . AvoidanceD . TransferenceView AnswerAnswer: D Explanation: Risk Transference refers to the...

March 6, 2022 No Comments READ MORE +