Which of the following should the organization ensure is Installed on all laptops?
An organization wants to enable built-in FDE on all laptops. Which of the following should the organization ensure is Installed on all laptops?A . TPM B. CA C. SAML D. CRLView AnswerAnswer: A Explanation: The organization should ensure that a Trusted Platform Module (TPM) is installed on all laptops in...
Which of the following certificate properties will meet these requirements?
As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements? A. HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 -...
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?
Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?A . GDPR B. PCI DSS C. ISO 27000 D. NIST 800-53View AnswerAnswer: D Explanation: NIST 800-53 provides a catalog of security and privacy controls related to the United States federal...
Which of the following biometric authentication methods is the MOST accurate?
Which of the following biometric authentication methods is the MOST accurate?A . Gait B. Retina C. Signature D. VoiceView AnswerAnswer: B Explanation: Retina authentication is the most accurate biometric authentication method. Retina authentication is based on recognizing the unique pattern of blood vessels and other features in the retina. This...
Which of the following is the BEST solution to prevent this type of incident from occurring again?
A backdoor was detected on the containerized application environment. The investigation detected that a zero-day vulnerability was introduced when the latest container image version was downloaded from a public registry. Which of the following is the BEST solution to prevent this type of incident from occurring again?A . Enforce the...
Which of the following must be in place before implementing a BCP?
Which of the following must be in place before implementing a BCP?A . SLA B. AUP C. NDA D. BIAView AnswerAnswer: D Explanation: A Business Impact Analysis (BIA) is a critical component of a Business Continuity Plan (BCP). It identifies and prioritizes critical business functions and determines the impact of...
Which of the following does this example describe?
A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?A . laC B. MSSP C. Containers D. SaaSView AnswerAnswer: A Explanation: laaS (Infrastructure as a Service) allows the...
Which of the following would be the BEST backup strategy?
A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy?A . Incremental backups followed by differential backups B....
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).A . Create a new network for...
Which of the following BEST represents the type of testing that is being used?
An enterprise has hired an outside security firm to facilitate penetration testing on its network and applications. The firm has agreed to pay for each vulnerability that ts discovered. Which of the following BEST represents the type of testing that is being used?A . White-box B. Red-leam C. Bug bounty...