Which of the following is the MOST likely reason for the need to sanitize the client data?
An organization is currently working with a client to migrate data between a legacy ERP system and a cloud-based ERP tool using a global PaaS provider. As part of the engagement, the organization is performing data deduplication and sanitization of client data to ensure compliance with regulatory requirements. Which of...
Which of the following should the system administrator implement?
A company wants to configure its wireless network to require username and password authentication. Which of the following should the system administrator implement?A . WPSB . PEAPC . TKIPD . PKIView AnswerAnswer: B
Which of the following is the BESRT way for the administrator to mitigate the effects of these attacks?
A network administrator is concerned about a particular server that is attacked occasionally from hosts on the Internet. The server is not critical; however, the attacks impact the rest of the network. While the company’s current ISP is cost effective, the ISP is slow to respond to reported issues. The...
Considering the institution’s very low risk tolerance, which of the following strategies would be BEST?
A financial institution’s information security officer is working with the risk management officer to determine what to do with the institution’s residual risk after all security controls have been implemented. Considering the institution’s very low risk tolerance, which of the following strategies would be BEST?A . Transfer the risk.B ....
Which of the following tools might the security administrator use to perform further security assessment of this issue?
A developer emails the following output to a security administrator for review: Which of the following tools might the security administrator use to perform further security assessment of this issue?A . Port scannerB . Vulnerability scannerC . FuzzerD . HTTP interceptorView AnswerAnswer: D
Which of the following is the MOST likely reason an organization would decide to use a BYOD policy?
Which of the following is the MOST likely reason an organization would decide to use a BYOD policy?A . It enables employees to use the devices they are already own, thus reducing costs.B . It should reduce the number of help desk and tickets significantly.C . It is most secure,...
Which of the following tools should be implemented to detect similar attacks?
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....
Given the following output from a security tool in Kali:
Given the following output from a security tool in Kali: A . Log reductionB . Network enumeratorC . FuzzerD . SCAP scannerView AnswerAnswer: D
Which of the following steps should the administrator take NEXT?
A systems administrator at a medical imaging company discovers protected health information (PHI) on a general purpose file server. Which of the following steps should the administrator take NEXT?A . Isolate all of the PHI on its own VLAN and keep it segregated at Layer 2B . Immediately encrypt all...
Which of the following tools will help get all the pictures from within the HTTP traffic captured to a specified folder?
Following a recent security incident on a web server the security analyst takes HTTP traffic captures for further investigation. The analyst suspects certain jpg files have important data hidden within them. Which of the following tools will help get all the pictures from within the HTTP traffic captured to a...