Which of the following is the BEST method for the company to prove Vie authenticity of the message?
A company enlists a trusted agent to implement a way to authenticate email senders positively. Which of the following is the BEST method for the company to prove Vie authenticity of the message?A . issue PlN-enabled hardware tokensB . Create a CA win all usersC . Configure the server to...
Which of the following is the MOST likely of the security breach?
While traveling to another state, the Chief Financial (CFO) forgot to submit payroll for the company. The CFO quickly gained to the corporate through the high-speed wireless network provided by the hotel and completed the desk. Upon returning from the business trip, the CFO was told no one received their...
Which of the following would BEST prevent the problem from reoccurring in the future?
A user workstation was infected with a new malware variant as a result of a drive-by download. The security administrator reviews key controls on the infected workstation and discovers the following: Which of the following would BEST prevent the problem from reoccurring in the future? (Choose two.)A . Install HIPSB...
Which of the following MOST likely occurred?
A security engineer is looking at a DNS server following a known incident. The engineer sees the following command as the most recent entry in the server's shell history: id ^f=iev/sda of=/dev/sdb Which of the following MOST likely occurred?A . A tape backup of the server was performed.B . The...
To which of the following is the survey question related?
A Chief Information Security Officer (CISO) has created a survey that will be distributed to managers of mission-critical functions across the organization. The survey requires the managers to determine how long their respective units can operate in the event of an extended IT outage before the organization suffers monetary losses...
As part of the company’s vendor due diligence, which of the following would be MOST important to obtain from the vendor?
As part of the asset management life cycle, a company engages a certified equipment disposal vendor to appropriately recycle and destroy company assets that are no longer in use. As part of the company’s vendor due diligence, which of the following would be MOST important to obtain from the vendor?A...
Which of the following tools is the engineer utilizing to perform this assessment?
A security engineer is performing an assessment again for a company. The security engineer examines the following output from the review: Which of the following tools is the engineer utilizing to perform this assessment?A . Vulnerability scannerB . SCAP scannerC . Port scannerD . Interception proxyView AnswerAnswer: B
After ensuring that full disk encryption is enabled, which of the following security measures should the technician take?
A technician is configuring security options on the mobile device manager for users who often utilize public Internet connections while travelling. After ensuring that full disk encryption is enabled, which of the following security measures should the technician take? (Choose two.)A . Require all mobile device backups to be encryptedB...
To meet these demands, which of the following BEST represent the features that should be included in the requirements set?
An organization is creating requirements for new laptops that will be issued to staff One of the company's key security objectives is to ensure the laptops nave hardware-enforced data-at-rest protection tied to permanent hardware identities. The laptops must also provide attestation for secure boot processes. To meet these demands, which...
Which of the following network tools would provide this type of information?
A technician is validating compliance with organizational policies. The user and machine accounts in the AD are not set to expire, which is non-compliant. Which of the following network tools would provide this type of information?A . SIEM serverB . IDS applianceC . SCAP scannerD . HTTP interceptorView AnswerAnswer: B