Which of the following is the MOST likely reason the MDM is not allowing enrollment?
A newly hired systems administrator is trying to connect a new and fully updated, but very customized, Android device to access corporate resources. However, the MDM enrollment process continually fails. The administrator asks a security team member to look into the issue. Which of the following is the MOST likely...
An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online? (Choose two.)
An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability. To prevent this type of breach in the future, which of the following security controls should be put in...
Which of the following methods could be used in addition to an integrated development environment to reduce the severity of the issue?
A software development manager is running a project using agile development methods. The company cybersecurity engineer has noticed a high number of vulnerabilities have been making it into production code on the project. Which of the following methods could be used in addition to an integrated development environment to reduce...
Which of the following is the MOST appropriate response?
A hospital’s security team recently determined its network was breached and patient data was accessed by an external entity. The Chief Information Security Officer (CISO) of the hospital approaches the executive management team with this information, reports the vulnerability that led to the breach has already been remediated, and explains...
Which of the following host-based security controls BEST enforce the data owner’s requirements?
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements: -The data is for internal consumption only and shall not be distributed to outside individuals -The systems administrator should not have access to the data processed by the server...
Which of the following should the company implement NEXT?
After multiple service interruptions caused by an older datacenter design, a company decided to migrate away from its datacenter. The company has successfully completed the migration of all datacenter servers and services to a cloud provider. The migration project includes the following phases: -Selection of a cloud provider -Architectural design...
Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?
A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?A . Randomly calling customer employees and posing as a help desk technician requiring user password to resolve issuesB...
Which of the following steps should the administrator take NEXT?
A systems administrator at a medical imaging company discovers protected health information (PHI) on a general purpose file server. Which of the following steps should the administrator take NEXT?A . Isolate all of the PHI on its own VLAN and keep it segregated at Layer 2B . Immediately encrypt all...
Which of the following SDLC best practices should the development team have followed?
A software development team has spent the last 18 months developing a new web-based front-end that will allow clients to check the status of their orders as they proceed through manufacturing. The marketing team schedules a launch party to present the new application to the client base in two weeks....
Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?
A recent assessment identified that several users’ mobile devices are running outdated versions of endpoint security software that do not meet the company’s security policy. Which of the following should be performed to ensure the users can access the network and meet the company’s security requirements?A . Vulnerability assessmentB ....