Which of the following is the MOST effective control against zero-day vulnerabilities?

Which of the following is the MOST effective control against zero-day vulnerabilities?A . Network segmentation B. Patch management C. Intrusion prevention system D. Multiple vulnerability scannersView AnswerAnswer: A

February 7, 2023 No Comments READ MORE +

Which of the following will increase cryptographic security?

Which of the following will increase cryptographic security?A . High data entropy B. Algorithms that require less computing power C. Longer key longevity D. HashingView AnswerAnswer: C

February 7, 2023 No Comments READ MORE +

In addition, which of the following should the auditor do to complete the assessment?

As part of a security compliance assessment, an auditor performs automated vulnerability scans. In addition, which of the following should the auditor do to complete the assessment?A . User behavior analysis B. Packet captures C. Configuration reviews D. Log analysisView AnswerAnswer: D Explanation: A vulnerability scanner is essentially doing that....

February 7, 2023 No Comments READ MORE +

Which of the following is the BEST certificate for these requirements?

A tax organization is working on a solution to validate the online submission of documents. The solution should be earned on a portable USB device that should be inserted on any computer that is transmitting a transaction securely. Which of the following is the BEST certificate for these requirements?A ....

February 7, 2023 No Comments READ MORE +

An ofgantzation has decided to purchase an insurance policy because a risk assessment determined that the cost to remediate the risk is greater than the five-year cost of the insurance policy. The organization is enabling risk

An ofgantzation has decided to purchase an insurance policy because a risk assessment determined that the cost to remediate the risk is greater than the five-year cost of the insurance policy. The organization is enabling riskA . avoidance B. acceptance C. mitigation D. transferenceView AnswerAnswer: D

February 7, 2023 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites. INSTRUCTIONS Click on each firewall to do the following: ✑ Deny cleartext web traffic. ✑ Ensure secure management protocols are used. Please Resolve issues at the...

February 6, 2023 No Comments READ MORE +

Which of the following would be BEST for the third-party vendor to provide to the CISO?

The Chief Information Security Officer (CISO) has requested that a third-party vendor provide supporting documents that show proper controls are in place to protect customer data. Which of the following would be BEST for the third-party vendor to provide to the CISO?A . GDPR compliance attestation B. Cloud Security Alliance...

February 6, 2023 No Comments READ MORE +

Which of the following is the policy MOST likely protecting against?

The Chief Compliance Officer from a bank has approved a background check policy for all new hires. Which of the following is the policy MOST likely protecting against?A . Preventing any current employees' siblings from working at the bank to prevent nepotism B. Hiring an employee who has been convicted...

February 6, 2023 No Comments READ MORE +

Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?

A company wants to improve end users experiences when they tog in to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website. Which of the following should be implemented to allow users to authenticate using their own credentials to...

February 6, 2023 No Comments READ MORE +

Which of the following attacks is being used to compromise the user accounts?

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following • All users share workstations throughout the day • Endpoint protection was disabled on several workstations throughout the network. • Travel times on logins...

February 6, 2023 No Comments READ MORE +