Which of the following does the organization plan to leverage?

A project manager is working with a team that is tasked to develop software applications in a structured environment and host them in a vendor’s cloud-based infrastructure. The organization will maintain responsibility for the software but will not manage the underlying server applications . Which of the following does the...

October 29, 2021 No Comments READ MORE +

Which of the following approaches is described?

To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO...

October 29, 2021 No Comments READ MORE +

Which of the following explains why an intended operator cannot perform the intended action?

A security analyst is troubleshooting a scenario in which an operator should only be allowed to reboot remote hosts but not perform other activities. The analyst inspects the following portions of different configuration files: Configuration file 1: Operator ALL=/sbin/reboot Configuration file 2: Command=”/sbin/shutdown now”, no-x11-forwarding, no-pty, ssh-dss Configuration file 3:...

October 29, 2021 No Comments READ MORE +

Which of the following is a concern for the consultant, and how can it be mitigated?

An online bank has contracted with a consultant to perform a security assessment of the bank’s web portal. The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site...

October 29, 2021 No Comments READ MORE +

To meet a SLA, which of the following documents should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.

To meet a SLA, which of the following documents should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines. A. BPA B. OLA C. MSA D. MOUView AnswerAnswer: B Explanation: OLA is an agreement between the internal support groups of an institution that supports SLA. According to...

October 29, 2021 No Comments READ MORE +

Which of the following is MOST likely to produce the needed information?

A consultant is hired to perform a passive vulnerability assessment of a company to determine what information might be collected about the company and its employees. The assessment will be considered successful if the consultant can discover the name of one of the IT administrators . Which of the following...

October 29, 2021 No Comments READ MORE +

A DevOps team wants to move production data into the QA environment for testing. This data contains credit card numbers and expiration dates that are not tied to any individuals. The security analyst wants to reduce risk .

A DevOps team wants to move production data into the QA environment for testing. This data contains credit card numbers and expiration dates that are not tied to any individuals. The security analyst wants to reduce risk . Which of the following will lower the risk before moving the data''A...

October 29, 2021 No Comments READ MORE +

Which of the following capabilities would a configuration compliance checker need to support to interpret this file?

An engineer wants to assess the OS security configurations on a company's servers. The engineer has downloaded some files to orchestrate configuration checks. When the engineer opens a file in a text editor, the following excerpt appears: Which of the following capabilities would a configuration compliance checker need to support...

October 28, 2021 No Comments READ MORE +

Which of the following would ensure no data is recovered from the system droves once they are disposed of?

During the decommissioning phase of a hardware project, a security administrator is tasked with ensuring no sensitive data is released inadvertently. All paper records are scheduled to be shredded in a crosscut shredded, and the waste will be burned. The system drives and removable media have been removed prior to...

October 28, 2021 No Comments READ MORE +

Which of the following is the BEST course of action for a security analyst to recommend to the software developer?

The code snippet below controls all electronic door locks to a secure facility in which the doors should only fail open in an emergency. In the code, “criticalValue” indicates if an emergency is underway: Which of the following is the BEST course of action for a security analyst to recommend...

October 28, 2021 No Comments READ MORE +