Which of the following would BEST support this objective?

A project manager is working with a software development group to collect and evaluate user stories related to the organization’s internally designed CRM tool. After defining requirements, the project manager would like to validate the developer’s interpretation and understanding of the user’s request . Which of the following would BEST...

September 5, 2021 No Comments READ MORE +

Which of the following security controls would be BEST to implement to mitigate the threat caused by the missing patch?

Following the most recent patch deployment, a security engineer receives reports that the ERP application is no longer accessible. The security engineer reviews the situation and determines a critical security patch that was applied to the ERP server is the cause. The patch is subsequently backed out. Which of the...

September 5, 2021 No Comments READ MORE +

Which of the following business documents defines the parameters the security administrator must confirm?

A security administrator is confirming specific ports and IP addresses that are monitored by the IPS-IDS system as well as the firewall placement on the perimeter network between the company and a new business partner. Which of the following business documents defines the parameters the security administrator must confirm?A ....

September 5, 2021 No Comments READ MORE +

Which of the following would BEST support immediate rollback of the failed fix?

An internal application has been developed to increase the efficiency of an operational process of a global manufacturer. New code was implemented to fix a security bug, but it has caused operations to halt. The executive team has decided fixing the security bug is less important than continuing operations. Which...

September 5, 2021 No Comments READ MORE +

Which of the following activities would be BEST to perform after a commit but before the creation of a branch?

A software development firm wants to validate the use of standard libraries as part of the software development process Each developer performs unit testing prior to committing changes to the code repository . Which of the following activities would be BEST to perform after a commit but before the creation...

September 5, 2021 No Comments READ MORE +

Which of the following describes the MOST likely root cause of the problem and offers a solution?

Several days after deploying an MDM for smartphone control, an organization began noticing anomalous behavior across the enterprise Security analysts observed the following: • Unauthorized certificate issuance • Access to mutually authenticated resources utilizing valid but unauthorized certificates • Granted access to internal resources via the SSL VPN To address...

September 5, 2021 No Comments READ MORE +

Which of the following is the BEST solution?

A security engineer is attempting to increase the randomness of numbers used in key generation in a system. The goal of the effort is to strengthen the keys against predictive analysis attacks. Which of the following is the BEST solution?A . Use an entropy-as-a-service vendor to leverage larger entropy pools.B...

September 4, 2021 No Comments READ MORE +

Based on the above findings, which of the following should the organization implement to prevent further exposure?

An organization wants to allow its employees to receive corporate email on their own smartphones. A security analyst is reviewing the following information contained within the file system of an employee’s smartphone: FamilyPix.jpg Taxreturn.tax paystub.pdf employeesinfo.xls SoccerSchedule.doc RecruitmentPlan.xls Based on the above findings, which of the following should the organization...

September 4, 2021 No Comments READ MORE +

Which of the following controls would BEST mitigate the identified vulnerability?

A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes . Which of the following controls...

September 4, 2021 No Comments READ MORE +

Which of the following BEST explains the reason why the CISO has not approved the request?

An organization is facing budget constraints. The Chief Technology Officer (CTO) wants to add a new marketing platform but the organization does not have the resources to obtain separate servers to run the new platform. The CTO recommends running the new marketing platform on a virtualized video-conferencing server because video...

September 4, 2021 No Comments READ MORE +