Which of the following is MOST likely causing the malware alerts?
Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS. Which of...
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
Which of the following is a team of people dedicated testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?A . Red teamB . While teamC . Blue teamD . Purple teamView AnswerAnswer: A
Which of the following is the consultant MOST likely to recommend to prepare for eradication?
An organization hired a consultant to assist with an active attack, and the consultant was able to identify the compromised accounts and computers. Which of the following is the consultant MOST likely to recommend to prepare for eradication?A . Quarantining the compromised accounts and computers, only providing them with network...
Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...
Which of the following should the university use to BEST protect these assets deployed in the facility?
A university is opening a facility in a location where there is an elevated risk of theft. The university wants to protect the desktops in its classrooms and labs. Which of the following should the university use to BEST protect these assets deployed in the facility?A . Visitor logsB ....
Which of the following would BEST meet the CSO's objectives?
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?A . Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration...
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?A . The data ownerB . The data processorC . The data stewardD . The data privacy officer.View AnswerAnswer: C
Which of the following would BEST meet the CSO's objectives?
A Chief Security Officer (CSO) was notified that a customer was able to access confidential internal company files on a commonly used file-sharing service. The file-sharing service is the same one used by company staff as one of its approved third-party applications. After further investigation, the security team determines the...
Which of the following would BEST achieve this objective?
A hospital's administration is concerned about a potential loss of patient data that is stored on tablets. A security administrator needs to implement controls to alert the SOC any time the devices are near exits. Which of the following would BEST achieve this objective?A . GeotargetingB . GeolocationC . GeotaggingD...
Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?
A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...