The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:

The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:A . IT systems are maintained in silos to minimize interconnected risks and...

July 21, 2020 No Comments READ MORE +

Which of the following technical options would provide the MOST preventive value?

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and...

July 21, 2020 No Comments READ MORE +

Which of the following capabilities would BEST improve the security position?

There is a lack of understanding of what is within the SCADA network. Which of the following capabilities would BEST improve the security position?A . VNC, router, and HIPSB . SIEM, VPN, and firewallC . Proxy, VPN, and WAFD . IDS, NAC, and log monitoringView AnswerAnswer: A

July 20, 2020 No Comments READ MORE +

Which of the following approaches is described?

To prepare for an upcoming audit, the Chief Information Security Officer (CISO) asks for all 1200 vulnerabilities on production servers to be remediated. The security engineer must determine which vulnerabilities represent real threats that can be exploited so resources can be prioritized to migrate the most dangerous risks. The CISO...

July 20, 2020 No Comments READ MORE +

To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take?

A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password...

July 20, 2020 No Comments READ MORE +

Which of the following is the BEST course of action for a security analyst to recommend to the software developer?

The code snippet below controls all electronic door locks to a secure facility in which the doors should only fail open in an emergency. In the code, “criticalValue” indicates if an emergency is underway: Which of the following is the BEST course of action for a security analyst to recommend...

July 20, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 20, 2020 No Comments READ MORE +

Which of the following actions should the SaaS provider perform to minimize legitimate customer impact?

A SaaS-based email service provider often receives reports from legitimate customers that their IP netblocks are on blacklists and they cannot send email. The SaaS has confirmed that affected customers typically have IP addresses within broader network ranges and some abusive customers within the same IP ranges may have performed...

July 20, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 20, 2020 No Comments READ MORE +

A security consultant is considering authentication options for a financial institution. The following authentication options are available

DRAG DROP A security consultant is considering authentication options for a financial institution. The following authentication options are available. Drag and drop the security mechanism to the appropriate use case. Options may be used once. View AnswerAnswer:

July 20, 2020 No Comments READ MORE +