Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?A . SSAE SOC 2B . PCI DSSC . GDPRD . ISO 31000View AnswerAnswer: C
Which of the following should the CISO read and understand before writing the policies?
A Chief Information Security Officer (CISO) needs to create a policy set that meets international standards for data privacy and sharing . Which of the following should the CISO read and understand before writing the policies?A . PCI DSSB . GDPRC . NISTD . ISO 31000View AnswerAnswer: B Explanation: GDPR...
Based on the analyst’s findings, which of the following attacks is being executed?
A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events: To better understand what is going on, the analyst runs a command and receives the following output:...
Which of the following attacks does the analyst MOST likely see in this packet capture?
A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output: Which of the following attacks does the...
Which of the following recommendations would BEST prevent this from reoccurring?
A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set . Which of the following recommendations...
Which of the following should the IT administrator do FIRST after recovery?
A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again . Which of the following should the IT administrator...
Which of the following attacks is MOST likely being detected?
A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of...
Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the VPN?
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the...
Which of the following BEST explains the difference between a data owner and a data custodian?
Which of the following BEST explains the difference between a data owner and a data custodian?A . The data owner is responsible for adhering to the rules for using the data, while the data custodian is responsible for determining the corporate governance regarding the dataB . The data owner is...
Which of the following describes the BEST approach for deploying application patches?
Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...