Which of the following solutions should the security team implement to mitigate the risk of data loss?
An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following: Unstructured data being exfiltrated after an employee leaves the...
Which of the following should the security administrator do to mitigate the risk?
A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the...
Which of the following should the security engineer do to BEST manage the threats proactively?
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?A . Join an information-sharing community that is relevant to...
Which of the following is a security concern that will MOST likely need to be addressed during migration?
A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . Latency B. Data exposure C. Data loss D. Data dispersionView AnswerAnswer:...
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites. The technician will define...
Which of the following vulnerabilities would MOST likely affect this site?
A security engineer notices the company website allows users following example: hitps://mycompany.com/main.php?Country=US Which of the following vulnerabilities would MOST likely affect this site?A . SQL injection B. Remote file inclusion C. Directory traversal - D. Unsecure referencesView AnswerAnswer: B Explanation: Remote file inclusion (RFI) is a web vulnerability that allows...
Which of the following controls would reduce the discovery time for similar in the future?
A company in the financial sector receives a substantial number of customer transaction requests via email. While doing a root-cause analysis conceding a security breach, the CIRT correlates an unusual spike in port 80 traffic from the IP address of a desktop used by a customer relations employee who has...
Which of the following should the security analyst perform?
A security analyst is investigating a series of suspicious emails by employees to the security team. The email appear to come from a current business partner and do not contain images or URLs. No images or URLs were stripped from the message by the security tools the company uses instead,...
Which of the following is the BEST solution for this company?
A small company needs to reduce its operating costs. vendors have proposed solutions, which all focus on management of the company’s website and services. The Chief information Security Officer (CISO) insist all available resources in the proposal must be dedicated, but managing a private cloud is not an option. Which...
Which of the following historian server locations will allow the business to get the required reports in an and IT environment?
An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports. Which of the following historian server locations will allow the business to get the required reports in an and...