Which of the following settings should be toggled to achieve the goal?
A security analyst is reviewing the corporate MDM settings and notices some disabled settings, which consequently permit users to download programs from untrusted developers and manually install them. After some conversations, it is confirmed that these settings were disabled to support the internal development of mobile applications. The security analyst...
Which of the following activities would be MOST appropriate?
A company contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?A . Use a protocol analyzer against the site to see if data input can be replayed from the browserB . Scan the website through an...
Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all
DRAG DROP Drag and drop the cloud deployment model to the associated use-case scenario. Options may be used only once or not at all. View AnswerAnswer:
Which of the following would be the BEST technique for the security engineer to employ in an attempt to prevent reconnaissance activity?
A company monitors the performance of all web servers using WMI. A network administrator informs the security engineer that web servers hosting the company’s client-facing portal are running slowly today. After some investigation, the security engineer notices a large number of attempts at enumerating host information via SNMP from multiple...
Which of the following need specific attention to meet the requirements listed above?
A security engineer has implemented an internal user access review tool so service teams can baseline user accounts and group memberships. The tool is functional and popular among its initial set of onboarded teams. However, the tool has not been built to cater to a broader set of internal teams...
The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:
The risk subcommittee of a corporate board typically maintains a master register of the most prominent risks to the company. A centralized holistic view of risk is particularly important to the corporate Chief Information Security Officer (CISO) because:A . IT systems are maintained in silos to minimize interconnected risks and...
Based on the data classification table above, which of the following BEST describes the overall classification?
An engineer is evaluating the control profile to assign to a system containing PII, financial, and proprietary data. Based on the data classification table above, which of the following BEST describes the overall classification?A . High confidentiality, high availabilityB . High confidentiality, medium availabilityC . Low availability, low confidentialityD ....
Which of the following would be the BEST methods to prepare this report?
The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...
Which of the following capabilities must be included for the OS to take advantage of this critical hardware-based countermeasure?
A company is developing requirements for a customized OS build that will be used in an embedded environment. The company procured hardware that is capable of reducing the likelihood of successful buffer overruns while executables are processing. Which of the following capabilities must be included for the OS to take...
A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons is the engineer concerned?
A systems security engineer is assisting an organization’s market survey team in reviewing requirements for an upcoming acquisition of mobile devices. The engineer expresses concerns to the survey team about a particular class of devices that uses a separate SoC for baseband radio I/O. For which of the following reasons...