Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?A . Risk matrix B. Risk tolerance C. Risk register D. Risk appetiteView AnswerAnswer: B Explanation: To determine the total risk an organization can...
Which of the following is the MOST likely cause?
A security analyst is reviewing the vulnerability scan report for a web server following an incident. The vulnerability that was used to exploit the server is present in historical vulnerability scan reports, and a patch is available for the vulnerability. Which of the following is the MOST likely cause? A....
Which of the following should the engineer implement?
A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?A . An air gap B. A hot site C. A VUAN D. A screened subnetView AnswerAnswer: D Explanation: A screened subnet...
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?A . GDPR B. PCI DSS C. ISO 27000 D. NIST 800-53View AnswerAnswer: D Explanation: NIST 800-53 provides a catalog of security and privacy controls related to the United States federal...
Which of the following roles would MOST likely include these responsibilities?
An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?A . Data protection officer B. Data owner C. Backup administrator D. Data...
Which of the following roles would MOST likely have direct access to the senior management team?
Which of the following roles would MOST likely have direct access to the senior management team? A. Data custodian B. Data owner C. Data protection officer D. Data controllerView AnswerAnswer: C Explanation: A data protection officer (DPO) is a role that oversees the data protection strategy and compliance of an...
Which of the following attacks was used?
An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?A . Cryptomalware B. Hash substitution C....
Which of the following attacks is being used to compromise the user accounts?
Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following: • All users share workstations throughout the day. • Endpoint protection was disabled on several workstations throughout the network. • Travel times on logins...
Which of the password attacks is MOST likely happening?
A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?A . Dictionary B. Rainbow table C. Spraying D. Brute-forceView AnswerAnswer: C Explanation: Detailed Explanation:...
Which of the following will the company MOST likely implement?
As part of a company's ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company MOST likely implement?A . TAXII B. TLP C. TTP D. STIXView AnswerAnswer: A Explanation: Trusted Automated Exchange of...