Which of the following host-based security controls BEST enforce the data owner’s requirements?

A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements: - The data is for internal consumption only and shall not be distributed to outside individuals - The systems administrator should not have access to the data processed by...

July 19, 2020 No Comments READ MORE +

Which of the following tools BEST supports the use of these definitions?

A security controls assessor intends to perform a holistic configuration compliance test of networked assets. The assessor has been handed a package of definitions provided in XML format, and many of the files have two common tags within them: “<object object_ref=… />” and “<state state_ref=… />”. Which of the following...

July 19, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 19, 2020 No Comments READ MORE +

Which of the following solutions BEST balances security requirements with business need?

A security engineer is designing a system in which offshore, outsourced staff can push code from the development environment to the production environment securely. The security engineer is concerned with data loss, while the business does not want to slow down its development process. Which of the following solutions BEST...

July 19, 2020 No Comments READ MORE +

As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability details about the financial system?

A Chief Information Officer (CIO) publicly announces the implementation of a new financial system. As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability...

July 19, 2020 No Comments READ MORE +

Which of the following methods could be used in addition to an integrated development environment to reduce the severity of the issue?

A software development manager is running a project using agile development methods. The company cybersecurity engineer has noticed a high number of vulnerabilities have been making it into production code on the project. Which of the following methods could be used in addition to an integrated development environment to reduce...

July 19, 2020 No Comments READ MORE +

Which of the following mitigation strategies should an information security manager recommend to the data owner?

Two new technical SMB security settings have been enforced and have also become policies that increase secure communications. Network Client: Digitally sign communication Network Server: Digitally sign communication A storage administrator in a remote location with a legacy storage array, which contains time-sensitive data, reports employees can no longer connect...

July 19, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

July 19, 2020 No Comments READ MORE +

For which of the following reasons is the engineer concerned?

A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons...

July 19, 2020 No Comments READ MORE +

Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?

A company’s Chief Operating Officer (COO) is concerned about the potential for competitors to infer proprietary information gathered from employees’ social media accounts. Which of the following methods should the company use to gauge its own social media threat level without targeting individual employees?A . Utilize insider threat consultants to...

July 19, 2020 No Comments READ MORE +