Which of the following SDLC best practices should the development team have followed?

A software development team has spent the last 18 months developing a new web-based front-end that will allow clients to check the status of their orders as they proceed through manufacturing. The marketing team schedules a launch party to present the new application to the client base in two weeks....

September 14, 2021 No Comments READ MORE +

Which of the following BEST describes how the manager should respond?

Ann, a terminated employee, left personal photos on a company-issued laptop and no longer has access to them. Ann emails her previous manager and asks to get her personal photos back . Which of the following BEST describes how the manager should respond?A . Determine if the data still exists...

September 14, 2021 No Comments READ MORE +

Which of the following services MOST likely identified the behavior and sent the report?

A company recently implemented a variety of security services to detect various types of traffic that pose a threat to the company. The following services were enabled within the network: • Scan of specific subsets for vulnerabilities • Categorizing and logging of website traffic • Enabling specific ACLs based on...

September 13, 2021 No Comments READ MORE +

Which of the following types of testing should be included in the testing platform?

A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the following requirements: ✑ Must be able to MITM web-based protocols ✑ Must be able to find common misconfigurations and security holes Which of the following types of testing should...

September 13, 2021 No Comments READ MORE +

Which of the following is the engineer implementing?

A server (10.0.0.2) on the corporate network is experiencing a DoS from a number of marketing desktops that have been compromised and are connected to a separate network segment. The security engineer implements the following configuration on the management router: Which of the following is the engineer implementing?A . Remotely...

September 13, 2021 No Comments READ MORE +

Which of the following mobile device specifications are required for this design?

A company is implementing a new secure identity application, given the following requirements • The cryptographic secrets used in the application must never be exposed to users or the OS • The application must work on mobile devices. • The application must work with the company's badge reader system Which...

September 13, 2021 No Comments READ MORE +

Which of the following BEST conveys the business impact for senior leadership?

Click on the exhibit buttons to view the four messages. A security architect is working with a project team to deliver an important service that stores and processes customer banking details. The project, internally known as ProjectX, is due to launch its first set of features publicly within a week,...

September 13, 2021 No Comments READ MORE +

Which of the following will BEST meet the CISO's mandate?

The Chief Information Security Officer (CISO) of a company that has highly sensitive corporate locations wants its security engineers to find a solution to growing concerns regarding mobile devices. The CISO mandates the following requirements: • The devices must be owned by the company for legal purposes. • The device...

September 13, 2021 No Comments READ MORE +

Which of the following controls MOST likely would have interrupted the kill chain in this attack?

A security analyst receives an email from a peer that includes a sample of code from a piece of malware found in an application running in the organization’s staging environment. During the incident response process, it is determined the code was introduced into the environment as a result of a...

September 13, 2021 No Comments READ MORE +