Which of the following MOST likely occurred and provides mitigation until the patches are released?

An organization's mobile device inventory recently provided notification that a zero-day vulnerability was identified in the code used to control the baseband of the devices. The device manufacturer is expediting a patch, but the rollout will take several months Additionally several mobile users recently returned from an overseas trip and...

November 3, 2021 No Comments READ MORE +

Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible as evidence?

During a criminal investigation, the prosecutor submitted the original hard drive from the suspect’s computer as evidence. The defense objected during the trial proceedings, and the evidence was rejected . Which of the following practices should the prosecutor’s forensics team have used to ensure the suspect’s data would be admissible...

November 2, 2021 No Comments READ MORE +

Which of the following BEST describes where the administrator should look to find information on the attack to determine if a response must be prepared for the systems?

A systems administrator receives an advisory email that a recently discovered exploit is being used in another country and the financial institutions have ceased operations while they find a way to respond to the attack . Which of the following BEST describes where the administrator should look to find information...

November 2, 2021 No Comments READ MORE +

Which of the following tools was used to gather this information from the hashed values in the file?

An information security officer is responsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks. To determine the users who should change their information, the information security officer...

November 2, 2021 No Comments READ MORE +

Which of the following solutions BEST meets all of the architect’s objectives?

A security architect is designing a system to satisfy user demand for reduced transaction time, increased security and message integrity, and improved cryptographic security. The resultant system will be used in an environment with a broad user base where many asynchronous transactions occur every minute and must be publicly verifiable....

November 2, 2021 No Comments READ MORE +

Which of the following should the consultant recommend be performed to evaluate potential risks?

A company has hired an external security consultant to conduct a thorough review of all aspects of corporate security. The company is particularly concerned about unauthorized access to its physical offices resulting in network compromises . Which of the following should the consultant recommend be performed to evaluate potential risks?A...

November 2, 2021 No Comments READ MORE +

Which of the following should the CISO interview as MOST qualified to provide RTO/RPO metrics?

A Chief Information Security Officer (CISO) is developing a new BIA for the organization. The CISO wants to gather requirements to determine the appropriate RTO and RPO for the organization’s ERP . Which of the following should the CISO interview as MOST qualified to provide RTO/RPO metrics?A . Data custodianB...

November 1, 2021 No Comments READ MORE +

As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability details about the financial system?

A Chief Information Officer (CIO) publicly announces the implementation of a new financial system. As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability...

November 1, 2021 No Comments READ MORE +

Which of the following should the company implement to improve code quality?

A software development company lost customers recently because of a large number of software issues. These issues were related to integrity and availability defects, including buffer overflows, pointer deferences, and others . Which of the following should the company implement to improve code quality? (Select two).A . Development environment access...

November 1, 2021 No Comments READ MORE +

Which of the following would be the BEST methods to prepare this report?

The board of a financial services company has requested that the senior security analyst acts as a cybersecurity advisor in order to comply with recent federal legislation. The analyst is required to give a report on current cybersecurity and threat trends in the financial services industry at the next board...

November 1, 2021 No Comments READ MORE +