Which of the following would be MOST appropriate for the project manager to solicit additional resources for during this phase of the project?

An organization is preparing to develop a business continuity plan. The organization is required to meet regulatory requirements relating to confidentiality and availability, which are well-defined. Management has expressed concern following initial meetings that the organization is not fully aware of the requirements associated with the regulations. Which of the...

April 18, 2018 No Comments READ MORE +

Which of the following should the analyst use to confirm this suspicion?

A forensics analyst suspects that a breach has occurred. Security logs show the company’s OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the...

April 7, 2018 No Comments READ MORE +

Which of the following techniques would BEST meet the requirements?

An insurance company has two million customers and is researching the top transactions on its customer portal. It identifies that the top transaction is currently password reset. Due to users not remembering their secret questions, a large number of calls are consequently routed to the contact center for manual password...

April 4, 2018 No Comments READ MORE +

Which of the following would have allowed the security team to use historical information to protect against the second attack?

Legal authorities notify a company that its network has been compromised for the second time in two years. The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks. Which of the following would have allowed the security team to use historical information...

April 3, 2018 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT Compliance with company policy requires a quarterly review of firewall rules. You are asked to conduct a review on the internal firewall sitting between several internal networks. The intent of this firewall is to make traffic more secure. Given the following information perform the tasks listed below: Untrusted...

April 1, 2018 No Comments READ MORE +

Which of the following should the security administrator implement?

A security administrator wants to allow external organizations to cryptographically validate the company’s domain name in email messages sent by employees. Which of the following should the security administrator implement?A . SPFB . S/MIMEC . TLSD . DKIMView AnswerAnswer: D References:

April 1, 2018 No Comments READ MORE +

Which of the following is the CISO performing?

Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and evaluating potential risk treatment strategies. As part of the CISO’s evaluation, a judgment of potential impact based on the identified risk is performed. To prioritize response actions, the CISO uses past experience...

April 1, 2018 No Comments READ MORE +

A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once

DRAG DROP A security consultant is considering authentication options for a financial institution. The following authentication options are available security mechanism to the appropriate use case. Options may be used once. View AnswerAnswer:

March 29, 2018 No Comments READ MORE +

Which of the following does the log sample indicate?

A security administrator was informed that a server unexpectedly rebooted. The administrator received an export of syslog entries for analysis: Which of the following does the log sample indicate? (Choose two.)A . A root user performed an injection attack via kernel moduleB . Encrypted payroll data was successfully decrypted by...

March 28, 2018 No Comments READ MORE +

Which of the following conclusions could the CISO draw from the analysis?

A Chief Information Security Officer (CISO) is reviewing the results of a gap analysis with an outside cybersecurity consultant. The gap analysis reviewed all procedural and technical controls and found the following: -High-impact controls implemented: 6 out of 10 -Medium-impact controls implemented: 409 out of 472 -Low-impact controls implemented: 97...

March 19, 2018 No Comments READ MORE +