Which of the following would mitigate the department’s concerns?

All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be: Leaked to the...

May 19, 2023 No Comments READ MORE +

Which of the following offers an authoritative decision about whether the evidence was obtained legally?

A forensic expert working on a fraud investigation for a US-based company collected a few disk images as evidence. Which of the following offers an authoritative decision about whether the evidence was obtained legally?A . Lawyers B. Court C. Upper management team D. PoliceView AnswerAnswer: A

May 19, 2023 No Comments READ MORE +

Which of the following is the BEST solution to meet these objectives?

A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive...

May 18, 2023 No Comments READ MORE +

Which of the following risk-handling techniques will BEST meet the organization's requirements?

An organization is assessing the security posture of a new SaaS CRM system that handles sensitive Pll and identity information, such as passport numbers. The SaaS CRM system does not meet the organization's current security standards. The assessment identifies the following: 1- There will be a $20,000 per day revenue...

May 18, 2023 No Comments READ MORE +

Which of the following is MOST likely the problem?

A security engineer is troubleshooting an issue in which an employee is getting an IP address in the range on the wired network. The engineer plus another PC into the same port, and that PC gets an IP address in the correct range. The engineer then puts the employee’ PC...

May 18, 2023 No Comments READ MORE +

Which of the following should the security analyst recommend to protect the affected data?

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt the data using the keys from the website. Which of the following should the security analyst recommend to protect the...

May 18, 2023 No Comments READ MORE +

Which of the following compensating controls would be BEST to implement in this situation?

A company’s Chief Information Security Officer is concerned that the company’s proposed move to the cloud could lead to a lack of visibility into network traffic flow logs within the VPC. Which of the following compensating controls would be BEST to implement in this situation?A . EDR B. SIEM C....

May 18, 2023 No Comments READ MORE +

Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?

A security analyst is reviewing the following vulnerability assessment report: Which of the following should be patched FIRST to minimize attacks against Internet-facing hosts?A . Server1 B. Server2 C. Server 3 D. ServersView AnswerAnswer: A

May 18, 2023 No Comments READ MORE +

Which of the following would be BEST suited to meet these requirements?

A vulnerability analyst identified a zero-day vulnerability in a company’s internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one. Which of the following would be BEST suited to meet these requirements?A . ARF B....

May 18, 2023 No Comments READ MORE +

Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?

A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time. Which of the following BEST describes the reason why utilizing a source code escrow...

May 18, 2023 No Comments READ MORE +