Which of the following BEST meets this objective?
The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors. Which of the following BEST meets this objective?A . Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to...
Which of the following would be the BEST methods to prepare this report?
The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...
Which of the following would be the BEST methods to prepare this report?
The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...
Which of the following is the MOST likely reason the MDM is not allowing enrollment?
A newly hired systems administrator is trying to connect a new and fully updated, but very customized, Android device to access corporate resources. However, the MDM enrollment process continually fails. The administrator asks a security team member to look into the issue. Which of the following is the MOST likely...
Which of the following activities would be MOST appropriate?
A company contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?A . Use a protocol analyzer against the site to see if data input can be replayed from the browserB . Scan the website through an...
Which of the following is the MOST likely reason for the need to sanitize the client data?
An organization is currently working with a client to migrate data between a legacy ERP system and a cloud-based ERP tool using a global PaaS provider. As part of the engagement, the organization is performing data deduplication and sanitization of client data to ensure compliance with regulatory requirements. Which of...
Which of the following would allow the organization to meet its requirement?
An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored. Which of the following would allow the organization to meet its requirement? (Choose two.)A . Exempt mobile devices from the requirement, as this will lead to privacy violationsB . Configure...
Which of the following tools should be implemented to detect similar attacks?
A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....
Which of the following MOST likely caused the data leak?
An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation...
Which of the following presents a long-term risk to user privacy in this scenario?
The legal department has required that all traffic to and from a company’s cloud-based word processing and email system is logged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloud-based...