Which of the following technical options would provide the MOST preventive value?

A financial consulting firm recently recovered from some damaging incidents that were associated with malware installed via rootkit. Post-incident analysis is ongoing, and the incident responders and systems administrators are working to determine a strategy to reduce the risk of recurrence. The firm’s systems are running modern operating systems and...

July 11, 2018 No Comments READ MORE +

Which of the following should the organization consider implementing along with VLANs to provide a greater level of segmentation?

During a security assessment, an organization is advised of inadequate control over network segmentation. The assessor explains that the organization’s reliance on VLANs to segment traffic is insufficient to provide segmentation based on regulatory standards. Which of the following should the organization consider implementing along with VLANs to provide a...

July 1, 2018 No Comments READ MORE +

Which of the following tools is the security engineer using to produce the above output?

A security engineer must establish a method to assess compliance with company security policies as they apply to the unique configuration of individual endpoints, as well as to the shared configuration policies of common devices. Which of the following tools is the security engineer using to produce the above output?A...

June 26, 2018 No Comments READ MORE +

Which of the following would BEST secure the web server until the replacement web server is ready?

A recent penetration test identified that a web server has a major vulnerability. The web server hosts a critical shipping application for the company and requires 99.99% availability. Attempts to fix the vulnerability would likely break the application. The shipping application is due to be replaced in the next three...

June 24, 2018 No Comments READ MORE +

Which of the following documents would BEST protect the company and ensure timely assistance?

A company is acquiring incident response and forensic assistance from a managed security service provider in the event of a data breach. The company has selected a partner and must now provide required documents to be reviewed and evaluated. Which of the following documents would BEST protect the company and...

June 22, 2018 No Comments READ MORE +

Which of the following should the CISO implement to BEST meet these requirements?

A business is growing and starting to branch out into other locations. In anticipation of opening an office in a different country, the Chief Information Security Officer (CISO) and legal team agree they need to meet the following criteria regarding data to open the new office: -Store taxation-related documents for...

June 21, 2018 No Comments READ MORE +

Which of the following should be implemented to remediate the above issues?

After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company’s IT department has seen a large number of the following incidents: -Duplicate IP addresses -Rogue network devices -Infected systems probing the company’s network Which of the following should be...

June 15, 2018 No Comments READ MORE +

Which of the following MOST likely caused the data leak?

An agency has implemented a data retention policy that requires tagging data according to type before storing it in the data repository. The policy requires all business emails be automatically deleted after two years. During an open records investigation, information was found on an employee’s work computer concerning a conversation...

June 14, 2018 No Comments READ MORE +

Which of the following types of information could be drawn from such participation?

An organization has employed the services of an auditing firm to perform a gap assessment in preparation for an upcoming audit. As part of the gap assessment, the auditor supporting the assessment recommends the organization engage with other industry partners to share information about emerging attacks to organizations in the...

June 11, 2018 No Comments READ MORE +

Which of the following business documents would be BEST to document this engagement?

Two competing companies experienced similar attacks on their networks from various threat actors. To improve response times, the companies wish to share some threat intelligence about the sources and methods of attack. Which of the following business documents would be BEST to document this engagement?A . Business partnership agreementB ....

June 9, 2018 No Comments READ MORE +