Which of the following is the use of the ACL in this situation an example of?
As part of a systems modernization program, the use of a weak encryption algorithm is identified m a wet se-vices API. The client using the API is unable to upgrade the system on its end which would support the use of a secure algorithm set As a temporary workaround the...
Which of the following controls would reduce the discovery time for similar in the future?
A company in the financial sector receives a substantial number of customer transaction requests via email. While doing a root-cause analysis conceding a security breach, the CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used by a customer relations employee who has...
Which of the following tools should be implemented to detect similar attacks?
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....
Which of the following would BEST track the reductions to show the CISO the engineer's plan is successful during each phase?
A manufacturing company's security engineer is concerned a remote actor may be able to access the ICS that is used to monitor the factory lines. The security engineer recently proposed some techniques to reduce the attack surface of the ICS to the Chief Information Security Officer (CISO) . Which of...
Which of the following would BEST meet this requirement?
A legal services company wants to ensure emails to clients maintain integrity in transit. Which of the following would BEST meet this requirement? (Select TWO)A . Signing emails to clients with the organization's public keyB . Using the organization's private key to encrypt all communicationC . Implementing a public key...
Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?
An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations. Which of the...
Which of the following mitigation strategies should an information security manager recommend to the data owner?
Two new technical SMB security settings have been enforced and have also become policies that increase secure communications. Network Client: Digitally sign communication Network Server: Digitally sign communication A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect...
Which of the following would BEST reduce the risk of this attack type occurring?
A core router was manipulated by a credentialed bypass to send all network traffic through a secondary router under the control of an unauthorized user connected to the network by WiFi. Which of the following would BEST reduce the risk of this attack type occurring?A . Implement a strong, complex...
Which of the following would be the CISO’s MOST immediate concern?
A Chief Information Securiy Officer (CISO) is reviewing technical documentation from various regional offices and notices some key differences between these groups. The CISO has not discovered any governance documentation. The CISO creates the following chart to visualize the differences among the networking used. Which of the following would be...
Which of the following should the new security administrator review to gain more information?
A networking administrator was recently promoted to security administrator in an organization that handles highly sensitive data. The Chief Information Security Officer (CISO) has just asked for all IT security personnel to review a zero-day vulnerability and exploit for specific application servers to help mitigate the organization’s exposure to that...