Which of the following employee roles is responsible for protecting an organization's collected personal information?

Which of the following employee roles is responsible for protecting an organization's collected personal information?A . CTO B. DPO C. CEO D. DBAView AnswerAnswer: B Explanation: Many companies also have a data protection officer or DPO. This is a higher-level manager who is responsible for the organization's overall data privacy...

March 17, 2023 No Comments READ MORE +

Which of the following security tools can improve vulnerability detection on this environment?

A software company adopted the following processes before releasing software to production; • Peer review • Static code scanning • Signing A considerable number of vulnerabilities are still being detected when code is executed on production. Which of the following security tools can improve vulnerability detection on this environment?A ....

March 17, 2023 No Comments READ MORE +

Which of the following controls was being violated?

A security policy states that common words should not be used as passwords. A security auditor was able to perform a dictionary attack against corporate credentials. Which of the following controls was being violated?A . Password complexity B. Password history C. Password reuse D. Password lengthView AnswerAnswer: B

March 17, 2023 No Comments READ MORE +

Which of the following tools will the other team member MOST likely use to open this file?

A security analyst generated a file named host1.pcap and shared it with a team member who is going to use it for further incident analysis. Which of the following tools will the other team member MOST likely use to open this file?A . Autopsy B. Memdump C. FTK imager D....

March 16, 2023 No Comments READ MORE +

Which of the following controls is most likely causing this issue and should be checked FIRST?

An administrator is experiencing issues when trying to upload a support file to a vendor A pop-up message reveals that a payment card number was found in the file, and the file upload was Mocked. Which of the following controls is most likely causing this issue and should be checked...

March 16, 2023 No Comments READ MORE +

Which of the following can be used to accomplish this task?

An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?A . Application allow list B. SWG C. Host-based firewall D. VPNView AnswerAnswer: B

March 16, 2023 No Comments READ MORE +

Which of the following describes the exploitation of an interactive process to gain access to restncted areas?

Which of the following describes the exploitation of an interactive process to gain access to restncted areas?A . Persistence B. Buffer overflow C. Privilege escalation D. PharmingView AnswerAnswer: C Explanation: https://en.wikipedia.org/wiki/Privilege_escalation#:~:text=Privilege%20escalation%20is%20the%20act,from%20an%20application%20or%20user

March 16, 2023 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites. INSTRUCTIONS Click on each firewall to do the following: ✑ Deny cleartext web traffic. ✑ Ensure secure management protocols are used. Please Resolve issues at the...

March 16, 2023 No Comments READ MORE +

Which of the following will increase cryptographic security?

Which of the following will increase cryptographic security?A . High data entropy B. Algorithms that require less computing power C. Longer key longevity D. HashingView AnswerAnswer: C

March 16, 2023 No Comments READ MORE +

Which of the following security controls can be implemented?

A company suspects that some corporate accounts were compromised. The number of suspicious logins from locations not recognized by the users is increasing Employees who travel need their accounts protected without the nsk of blocking legitimate login requests that may be made over new sign-in properties. Which of the following...

March 16, 2023 No Comments READ MORE +