Which of the following risk management strategies has the organization employed?

Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...

October 28, 2021 No Comments READ MORE +

A security administrator must configure the database server shown below to comply with the four requirements listed

DRAG DROP A security administrator must configure the database server shown below to comply with the four requirements listed. Drag and drop the appropriate ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all. View AnswerAnswer:

October 27, 2021 No Comments READ MORE +

Which of the following need specific attention to meet the requirements listed above?

A security engineer has implemented an internal user access review tool so service teams can baseline user accounts and group memberships. The tool is functional and popular among its initial set of onboarded teams. However, the tool has not been built to cater to a broader set of internal teams...

October 27, 2021 No Comments READ MORE +

Which of the following is the MOST important information to reference in the letter?

The marketing department has developed a new marketing campaign involving significant social media outreach. The campaign includes allowing employees and customers to submit blog posts and pictures of their day-to-day experiences at the company. The information security manager has been asked to provide an informative letter to all participants regarding...

October 27, 2021 No Comments READ MORE +

An organization based in the United States is planning to expand its operations into the European market later in the year Legal counsel is exploring the additional requirements that must be established as a result of the expansion. The BEST course of action would be to

An organization based in the United States is planning to expand its operations into the European market later in the year Legal counsel is exploring the additional requirements that must be established as a result of the expansion. The BEST course of action would be toA . revise the employee...

October 27, 2021 No Comments READ MORE +

Which of the following BEST meets the needs of the board?

The Chief Information Officer (CIO) has been asked to develop a security dashboard with the relevant metrics. The board of directors will use the dashboard to monitor and track the overall security posture of the organization. The CIO produces a basic report containing both KPI and KRI data in two...

October 27, 2021 No Comments READ MORE +

Which of the following are security advantages of the use of this combination of thin clients and virtual workstations?

An organization is considering the use of a thin client architecture as it moves to a cloud-hosted environment. A security analyst is asked to provide thoughts on the security advantages of using thin clients and virtual workstations . Which of the following are security advantages of the use of this...

September 16, 2021 No Comments READ MORE +

Which of the following should the script use to BEST accomplish this task?

A security administrator is concerned about employees connecting their personal devices to the company network. Doing so is against company policy. The network does not have a NAC solution. The company uses a GPO that disables the firewall on all company-owned devices while they are connected to the internal network...

September 16, 2021 No Comments READ MORE +

Which of the following should be configured?

A company’s security policy states any remote connections must be validated using two forms of network-based authentication. It also states local administrative accounts should not be used for any remote access. PKI currently is not configured within the network. RSA tokens have been provided to all employees, as well as...

September 15, 2021 No Comments READ MORE +

Which of the following would BEST accomplish this objective?

A security analyst is reviewing an endpoint that was found to have a rookit installed. The rootkit survived multiple attempts to clean the endpoints, as well as an attempt to reinstall the QS. The security analyst needs to implement a method to prevent other endpoint from having similar issues ....

September 15, 2021 No Comments READ MORE +