Which of the following does the business’s IT manager need to consider?

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business’s IT manager need to consider?A . The availability of personal dataB . The right to personal data erasureC . The company’s annual...

September 11, 2022 No Comments READ MORE +

Which of the following controls primarily detects abuse of privilege but does not prevent it?

Which of the following controls primarily detects abuse of privilege but does not prevent it?A . Off-boardingB . Separation of dutiesC . Least privilegeD . Job rotationView AnswerAnswer: A

September 11, 2022 No Comments READ MORE +

Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users. Which of the following would be BEST for the developer to perform? (Choose two.)A . Utilize code signing by a trusted third party.B . Implement certificate-based authentication.C ....

September 11, 2022 No Comments READ MORE +

Which of the following should a security architect recommend?

A recent data breach revealed that a company has a number of files containing customer data across its storage environment. These files are individualized for each employee and are used in tracking various customer orders, inquiries, and issues. The files are not encrypted and can be accessed by anyone. The...

September 11, 2022 No Comments READ MORE +

Which of the following is MOST likely the problem?

A security engineer is troubleshooting an issue in which an employee is getting an IP address in the range on the wired network. The engineer plus another PC into the same port, and that PC gets an IP address in the correct range. The engineer then puts the employee’ PC...

September 10, 2022 No Comments READ MORE +

Which of the following sources could the architect consult to address this security concern?

A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks. Which of the following sources could...

September 10, 2022 No Comments READ MORE +

Which of the following systems should the consultant review before making a recommendation?

A security consultant needs to protect a network of electrical relays that are used for monitoring and controlling the energy used in a manufacturing facility. Which of the following systems should the consultant review before making a recommendation?A . CANB . ASICC . FPGAD . SCADAView AnswerAnswer: D Explanation: Reference:...

September 10, 2022 No Comments READ MORE +

Which of the following is the MOST cost-effective solution?

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to...

September 10, 2022 No Comments READ MORE +

Which of the following should the organization perform NEXT?

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact. Which of the following should the organization perform NEXT?A...

September 10, 2022 No Comments READ MORE +

Which of the following be the FIRST step taken by the team?

A Chief information Security Officer (CISO) has launched to create a rebuts BCP/DR plan for the entire company. As part of the initiative, the security team must gather data supporting s operational importance for the applications used by the business and determine the order in which the application must be...

September 10, 2022 No Comments READ MORE +