Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).A . Mantraps B. Security guards C. Video surveillance D. Fences E. Bollards F. AntivirusView AnswerAnswer: A, B Explanation: A - a mantrap can trap those personnal with bad intension(preventive), and...
Which of the following is MOST likely the issue?
A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when writing documents and the mouse pointer occasional disappears. The task list shows the following results Which of the following is MOST likely the issue?A . RAT B. PUP C. Spyware D. KeyloggerView AnswerAnswer: C Explanation:...
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrix B. Risk tolerance C. Risk register D. Risk appetiteView AnswerAnswer: B Explanation: To determine the total risk an organization can...
Which of the following actions MOST likely supports an investigation for fraudulent submission?
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email...
Which of the following BEST explains what happened?
After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time. Which of the following BEST explains what happened?A . The unexpected traffic correlated against multiple rules, generating multiple alerts. B. Multiple alerts were...
Which of the following should the company use to secure its website if the company is concerned with convenience and cost?
A retail company that is launching @ new website to showcase the company’s product line and other information for online shoppers registered the following URLs: * www companysite com * shop companysite com * about-us companysite com contact-us. companysite com secure-logon company site com Which of the following should the...
Which of the following BEST describes what is happening?
one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?A . Birthday collision on the certificate key B. DNS hacking to reroute traffic C. Brute force to the access point D....
Which of the following should the organization use to inform the affected parties?
A security researcher has alerted an organization that its sensitive user data was found for sale on a website. Which of the following should the organization use to inform the affected parties?A . A An incident response plan B. A communications plan C. A business continuity plan D. A disaster...
Which of the following network appliances can achieve this goal?
An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?A . HSM B. CASB C. TPM D. DLPView AnswerAnswer: A Explanation: Hardware Security Module (HSM) is a network appliance designed to securely store cryptographic keys and perform cryptographic operations....
Which of the following BEST explains a risk of this practice?
A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?A . Default system configuration B. Unsecure protocols C. Lack of vendor support D. Weak encryptionView AnswerAnswer: C Explanation: One of the risks of using legacy...