Which of the following is MOST likely occurring?

A customer has reported that an organization's website displayed an image of a smiley (ace rather than the expected web page for a short time two days earlier. A security analyst reviews log tries and sees the following around the lime of the incident: Which of the following is MOST...

August 11, 2023 No Comments READ MORE +

duration of time?

Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?A . PoC B. Production C. Test D. DevelopmentView AnswerAnswer: A...

August 11, 2023 No Comments READ MORE +

Which of the following would be the BEST control for the company to require from prospective vendors?

A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?A ....

August 11, 2023 No Comments READ MORE +

Which of the following cryptographic techniques would BEST meet the requirement?

A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned...

August 11, 2023 No Comments READ MORE +

Which of the following BEST represents the type of testing that is being used?

An enterprise has hired an outside security firm to facilitate penetration testing on its network and applications. The firm has agreed to pay for each vulnerability that ts discovered. Which of the following BEST represents the type of testing that is being used?A . White-box B. Red-leam C. Bug bounty...

August 11, 2023 No Comments READ MORE +

Which of the following is the BEST security solution to reduce this risk?

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?A . CASB B. VPN concentrator C. MFA D. VPC...

August 11, 2023 No Comments READ MORE +

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?A . RTO B. MTBF C. MTTR D. RPOView AnswerAnswer: C Explanation: Mean Time To Repair (MTTR) is a maintenance metric that measures the average time required to troubleshoot and restore...

August 10, 2023 No Comments READ MORE +

Which of the following is the BEST technical implementation to prevent this from happening again?

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again. Which of the following is the BEST technical implementation to prevent this from happening again?A . Configure DLP solutions B. Disable peer-to-peer sharing C. Enable...

August 10, 2023 No Comments READ MORE +

Which of the following documents did Ann receive?

Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations. Which of the following documents did Ann receive?A . An annual privacy notice B. A non-disclosure agreement C. A privileged-user agreement D. A memorandum...

August 10, 2023 No Comments READ MORE +

Which of the following constraints BEST describes the reason the findings cannot be remediated?

A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business. Which of the following constraints BEST describes the reason the findings cannot be remediated?A . inability to authenticate B. Implied...

August 10, 2023 No Comments READ MORE +