Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly?

A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files on a system remotely. A fix was recently published, but it requires a recent endpoint protection engine to be installed...

February 4, 2020 No Comments READ MORE +

Which of the following risk management strategies has the organization employed?

Management is reviewing the results of a recent risk assessment of the organization’s policies and procedures. During the risk assessment it is determined that procedures associated with background checks have not been effectively implemented. In response to this risk, the organization elects to revise policies and procedures related to background...

February 4, 2020 No Comments READ MORE +

To meet an SLA, which of the following document should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.

To meet an SLA, which of the following document should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines. A. BPA B. OLA C. MSA D. MOUView AnswerAnswer: B Explanation: Explanation: OLA is an agreement between the internal support groups of an institution that supports SLA. According...

February 4, 2020 No Comments READ MORE +

Which of the following techniques would BEST meet the requirements?

An insurance company has two million customers and is researching the top transactions on its customer portal. It identifies that the top transaction is currently password reset. Due to users not remembering their secret questions, a large number of calls are consequently routed to the contact center for manual password...

February 4, 2020 No Comments READ MORE +

Which of the following is MOST likely to produce the needed information?

A consultant is hired to perform a passive vulnerability assessment of a company to determine what information might be collected about the company and its employees. The assessment will be considered successful if the consultant can discover the name of one of the IT administrators. Which of the following is...

February 4, 2020 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

February 4, 2020 No Comments READ MORE +

The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company.

The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:A . IT systems are maintained in silos to minimize interconnected risks and...

February 3, 2020 No Comments READ MORE +

Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?

During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization’s reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a...

February 3, 2020 No Comments READ MORE +

Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?

A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?A . Randomly calling customer employees and posing as a help desk technician requiring user password to resolve issuesB...

February 3, 2020 No Comments READ MORE +

Which of the following did the analyst use to determine the location of the malicious payload?

A company wants to perform analysis of a tool that is suspected to contain a malicious payload. A forensic analyst is given the following snippet: ^32^[34fda19(fd^43gfd/home/user/lib/module.so.343jk^rfw(342fds43g Which of the following did the analyst use to determine the location of the malicious payload?A . Code deduplicatorsB . Binary reverse-engineeringC . Fuzz...

February 3, 2020 No Comments READ MORE +