Which of the following is the security analyst MOST likely implementing?

A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected. Which of the following is the security analyst MOST likely implementing?A . Vulnerability scans B. User behavior analysis C. Security orchestration, automation, and response D. Threat...

February 9, 2023 No Comments READ MORE +

Which of the following is the BEST mitigation strategy to prevent this from happening in the future?

A company recently experienced a significant data loss when proprietary Information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An Investigation confirmed the corporate network was not breached, but documents were downloaded...

February 9, 2023 No Comments READ MORE +

Which of the following would BEST meet the requirements?

A security analyst is designing the apocopate controls to limit unauthorized access to a physical site. The analyst has a directive to utilize the lowest possible budget. Which of the following would BEST meet the requirements?A . Preventive controls B. Compensating controls C. Deterrent controls D. Detective controlsView AnswerAnswer: C...

February 9, 2023 No Comments READ MORE +

Which of the following can be used to accomplish this task?

An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?A . Application allow list B. SWG C. Host-based firewall D. VPNView AnswerAnswer: B

February 8, 2023 No Comments READ MORE +

Which of the following risk management practices does the BEST describe?

The board of doctors at a company contracted with an insurance firm to limit the organization’s liability. Which of the following risk management practices does the BEST describe?A . Transference B. Avoidance C. Mitigation D. AcknowledgementView AnswerAnswer: A

February 8, 2023 No Comments READ MORE +

Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?

Which of the following control Types would be BEST to use in an accounting department to reduce losses from fraudulent transactions?A . Recovery B. Deterrent C. Corrective D. DetectiveView AnswerAnswer: C Explanation: Corrective controls are implemented after detective controls to rectify the problem and (ideally) prevent it from happening again.

February 8, 2023 No Comments READ MORE +

Which of the following would BEST describe the estimated number of devices to be replaced next year?

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced...

February 8, 2023 No Comments READ MORE +

Which of the following is a benefit of including a risk management framework into an organization's security approach?

Which of the following is a benefit of including a risk management framework into an organization's security approach?A . It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner B. It identifies specific vendor products that have been tested and...

February 8, 2023 No Comments READ MORE +

Which of the following BEST reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?

Which of the following BEST reduces the security risks introduced when running systems that have expired vendor support and lack an immediate replacement?A . Implement proper network access restrictions B. Initiate a bug bounty program B. Classify the system as shadow IT. C. Increase the frequency of vulnerability scansView AnswerAnswer:...

February 7, 2023 No Comments READ MORE +

Which of the following should the company consult?

A company is auditing the manner in which its European customers' personal information is handled. Which of the following should the company consult?A . GDPR B. ISO C. NIST D. PCI DSSView AnswerAnswer: A

February 7, 2023 No Comments READ MORE +