A company labeled some documents with the public sensitivity classification This means the documents can be accessed by:
A company labeled some documents with the public sensitivity classification This means the documents can be accessed by:A . employees of other companies and the press B. all members of the department that created the documents C. only the company's employees and those listed in the document D. only the...
Which of the following should the company consult?
A company is auditing the manner in which its European customers' personal information is handled. Which of the following should the company consult?A . GDPR B. ISO C. NIST D. PCI DSSView AnswerAnswer: A
Which of the following would MOST likely meet the organizations requirement?
An organization wants to participate in threat intelligence information sharing with peer groups. Which of the following would MOST likely meet the organizations requirement?A . Perform OSINT investigations B. Subscribe to threat intelligence feeds C. Submit RFCs D. Implement a TAXII serverView AnswerAnswer: B
Which of the following is the BEST way for the company to mitigate this attack?
A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?A . Create a honeynet to trap attackers who access the VPN with credentials...
Which of the following would be the MOST prudent course of action?
A recent audit cited a risk involving numerous low-criticality vulnerabilities created by a web application using a third-party library. The development staff state there are still customers using the application even though it is end of life and it would be a substantial burden to update the application for compatibility...
Which of the following solutions would BEST meet the needs of the company?
A company is considering transitioning to the cloud. The company employs individuals from various locations around the world. The company does not want to increase its on-premises infrastructure blueprint and only wants to pay for additional compute power required. Which of the following solutions would BEST meet the needs of...
Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configunng network devices?
After a recent security breach a security analyst reports that several admimstratrve usemames and passwords are being sent via cieartext across the network to access network devices over prot 23. Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and...
An attack has occurred against a company
DRAG DROP An attack has occurred against a company. INSTRUCTIONS You have been tasked to do the following: Identify the type of attack that is occurring on the network by clicking on the attacker’s tablet and reviewing the output. (Answer Area 1). Identify which compensating controls should be implemented on...
Which of the following is a benefit of including a risk management framework into an organization's security approach?
Which of the following is a benefit of including a risk management framework into an organization's security approach?A . It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner B. It identifies specific vendor products that have been tested and...
Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?
Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?A . Putting security/antitamper tape over USB ports logging the port numbers and regularly inspecting the ports B. Implementing a GPO that will restrict access to authorized USB removable media...