Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

February 13, 2020 No Comments READ MORE +

Which of the following would be the BEST source of reference during the revision process?

A Chief Information Security Officer (CISO is reviewing and revising system configuration and hardening guides that were developed internally and have been used several years to secure the organization’s systems. The CISO knows improvements can be made to the guides. Which of the following would be the BEST source of...

February 13, 2020 No Comments READ MORE +

Which of the following is the CISO performing?

Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and evaluating potential risk treatment strategies. As part of the CISO’s evaluation, a judgment of potential impact based on the identified risk is performed. To prioritize response actions, the CISO uses past experience...

February 12, 2020 No Comments READ MORE +

Which of the following tools is the security engineer using to produce the above output?

A security engineer must establish a method to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices. Which of the following tools is the security engineer using to produce the above output?A...

February 12, 2020 No Comments READ MORE +

Compliance with company policy requires a quarterly review of firewall rules. You are asked to conduct a review on the internal firewall sitting between several internal networks. The intent of this firewall is to make traffic more secure

SIMULATION Compliance with company policy requires a quarterly review of firewall rules. You are asked to conduct a review on the internal firewall sitting between several internal networks. The intent of this firewall is to make traffic more secure. Given the following information perform the tasks listed below: Untrusted zone:...

February 12, 2020 No Comments READ MORE +

To reduce the risks associated with this scenario while minimizing disruption to ongoing testing, which of the following are the BEST actions to take?

A software development team is conducting functional and user acceptance testing of internally developed web applications using a COTS solution. For automated testing, the solution uses valid user credentials from the enterprise directory to authenticate to each application. The solution stores the username in plain text and the corresponding password...

February 12, 2020 No Comments READ MORE +

A security administrator must configure the database server shown below to comply with the four requirements listed

DRAG DROP A security administrator must configure the database server shown below to comply with the four requirements listed. Drag and drop the appropriate ACL that should be configured on the database server to its corresponding requirement. Answer options may be used once or not at all. View AnswerAnswer:

February 11, 2020 No Comments READ MORE +

To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online?

An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in...

February 11, 2020 No Comments READ MORE +

If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?

A network engineer is attempting to design-in resiliency characteristics for an enterprise network’s VPN services. If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?A . Implement a reverse proxy for VPN traffic...

February 11, 2020 No Comments READ MORE +

Which of the following tools should be implemented to detect similar attacks?

A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?A . Vulnerability scannerB . TPMC . Host-based firewallD ....

February 10, 2020 No Comments READ MORE +