A company requires a task to be carried by more than one person concurrently.

A company requires a task to be carried by more than one person concurrently. This is an example of:A . separation of d duties.B . dual controlC . least privilegeD . job rotationView AnswerAnswer: B Explanation: Dual control is a security principle that requires two or more authorized individuals to...

March 17, 2024 No Comments READ MORE +

Which of the following would mitigate the department’s concerns?

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be: Leaked to the...

March 17, 2024 No Comments READ MORE +

Which of the following attack types is the threat analyst seeing?

A threat analyst notices the following URL while going through the HTTP logs. Which of the following attack types is the threat analyst seeing?A . SQL injectionB . CSRFC . Session hijackingD . XSSView AnswerAnswer: D Explanation: XSS stands for cross-site scripting, which is a type of attack that injects...

March 17, 2024 No Comments READ MORE +

Which of the following processes would BEST satisfy this requirement?

During a remodel, a company’s computer equipment was moved to a secure storage room with cameras positioned on both sides of the door. The door is locked using a card reader issued by the security team, and only the security team and department managers have access to the room. The...

March 17, 2024 No Comments READ MORE +

Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?

A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location. Which of the following technologies can the developer enable...

March 16, 2024 No Comments READ MORE +

Which of the following should the engineer report as the ARO for successful breaches?

A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times. Which of the following should the engineer report as the ARO for successful breaches?A . 0.5B . 8C . 50D . 36,500View...

March 16, 2024 No Comments READ MORE +

Which of the following is the BEST solution?

A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have...

March 16, 2024 No Comments READ MORE +

Which of the following would be the BEST option to implement?

Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not...

March 15, 2024 No Comments READ MORE +

Which of the following would be BEST to proceed with the transformation?

A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident. Which of the following would be BEST to proceed with the transformation?A . An on-premises solution as a backupB . A load balancer with...

March 15, 2024 No Comments READ MORE +

Which of the following is a security concern that will MOST likely need to be addressed during migration?

A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . LatencyB . Data exposureC . Data lossD . Data dispersionView AnswerAnswer:...

March 15, 2024 No Comments READ MORE +