Which of the following risk management strategies has the organization employed?
Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...
Which of the following would be the BEST technique for the security engineer to employ in an attempt to prevent reconnaissance activity?
A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web servers hosting the company’s client-facing portal are running slowly today. After some investigation, the security engineer notices a large number of attempts at enumerating host information via SNMP from multiple...
Which of the following capabilities must be included for the OS to take advantage of this critical hardware-based countermeasure?
A company is developing requirements for a customized OS build that will be used in an embedded environment. The company procured hardware that is capable of reducing the likelihood of successful buffer overruns while executables are processing. Which of the following capabilities must be included for the OS to take...
Which of the following techniques would BEST meet the requirements?
An insurance company has two million customers and is researching the top transactions on its customer portal. It identifies that the top transaction is currently password reset. Due to users not remembering their secret questions, a large number of calls are consequently routed to the contact center for manual password...
Which of the following combinations of techniques would the engineer MOST likely use in this testing?
An advanced threat emulation engineer is conducting testing against a client’s network. The engineer conducts the testing in as realistic a manner as possible. Consequently, the engineer has been gradually ramping up the volume of attacks over a long period of time. Which of the following combinations of techniques would...
Which of the following methods would BEST assess the security of the product?
A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle. Which of the following methods would...
Which of the following activities would be MOST appropriate?
A company contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?A . Use a protocol analyzer against the site to see if data input can be replayed from the browserB . Scan the website through an...
Which of the following did the analyst use to determine the location of the malicious payload?
A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet: ^32^[34fda19(fd^43gfd/home/user/lib/module.so.343jk^rfw(342fds43g Which of the following did the analyst use to determine the location of the malicious payload?A . Code deduplicatorsB . Binary reverse-engineeringC . Fuzz...
Which of the following would allow the organization to meet its requirement?
An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored. Which of the following would allow the organization to meet its requirement? (Choose two.)A . Exempt mobile devices from the requirement, as this will lead to privacy violationsB . Configure...
Using the table above, which of the following would be the BEST business-driven choice among the five possible solutions?
After investigating virus outbreaks that have cost the company $1000 per incident, the company’s Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet...