Which of the following would be the BEST option to manage this risk to the company's production environment?
A company relies on an ICS to perform equipment monitoring functions that are federally mandated for operation of the facility. Fines for non-compliance could be costly. The ICS has known vulnerabilities and can no longer be patched or updated. Cyber-liability insurance cannot be obtained because insurance companies will not insure...
Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all
DRAG DROP Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all. View AnswerAnswer:
Which of the following should the CISO task a security analyst with to determine whether or not the attachment is safe?
An organization’s Chief Financial Officer (CFO) was the target of several different social engineering attacks recently. The CFO has subsequently worked closely with the Chief Information Security Officer (CISO) to increase awareness of what attacks may look like. An unexpected email arrives in the CFO’s inbox from a familiar name...
Which of the following would BEST address these privacy concerns?
A company runs a well Cattended, on-premises fitness club for its employees, about 200 of them each day. Employees want to sync center’s login and attendance program with their smartphones. Human resources, which manages the contract for the fitness center, has asked the security architecture to help draft security and...
A security engineer is employed by a hospital that was recently purchased by a
A security engineer is employed by a hospital that was recently purchased by a corporation. Throughout the acquisition process, all data on the virtualized file servers must be shared by departments within both organizations. The security engineer considers data ownership to determine:A . the amount of data to be moved.B...
Which of the following controls can the organization implement to reduce the risk of similar breaches?
A company recently implemented a new cloud storage solution and installed the required synchronization client on all company devices. A few months later, a breach of sensitive data was discovered. Root cause analysis shows the data breach happened from a lost personal mobile device. Which of the following controls can...
Which of the following would ensure no data is recovered from the system droves once they are disposed of?
During the decommissioning phase of a hardware project, a security administrator is tasked with ensuring no sensitive data is released inadvertently. All paper records are scheduled to be shredded in a crosscut shredded, and the waste will be burned. The system drives and removable media have been removed prior to...
Which of the following would BEST address the CIO’s concerns?
The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaS applications. The applications are configured to use passwords, and two-factor authentication is not provided natively. Which of the following would BEST address the CIO’s concerns?A . Procure a password manager for the employees to...
As part of the vendor’s compliance program, which of the following would be important to take into account?
A vendor develops a mobile application for global customers. The mobile application supports advanced encryption of data between the source (the mobile device) and the destination (the organization’s ERP system). As part of the vendor’s compliance program, which of the following would be important to take into account?A . Mobile...
Which of the following controls would BEST mitigate the identified vulnerability?
A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes. Which of the following controls would...