Which of the following is MOST suited to quickly implement a control?

An input validation and exception handling vulnerability has been discovered on a critical web-based system . Which of the following is MOST suited to quickly implement a control?A . Add a new rule to the application layer firewallB . Block access to the serviceC . Install an Intrusion Detection System...

May 28, 2022 No Comments READ MORE +

Which of the following is the FIRST step in the incident response process?

Which of the following is the FIRST step in the incident response process?A . Determine the cause of the incidentB . Disconnect the system involved from the networkC . Isolate and contain the system involvedD . Investigate all symptoms to confirm the incidentView AnswerAnswer: D

May 28, 2022 No Comments READ MORE +

Which control would prevent the users from obtaining an individual employee’s salary?

Users require access rights that allow them to view the average salary of groups of employees . Which control would prevent the users from obtaining an individual employee’s salary?A . Limit access to predefined queriesB . Segregate the database into a small number of partitions each with a separate security...

May 28, 2022 No Comments READ MORE +

Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?

Which one of the following security mechanisms provides the BEST way to restrict the execution of privileged procedures?A . Role Based Access Control (RBAC)B . Biometric access controlC . Federated Identity Management (IdM)D . Application hardeningView AnswerAnswer: A

May 28, 2022 No Comments READ MORE +

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

Which of the following types of technologies would be the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?A . Install mantraps at the building entrancesB . Enclose the personnel entry area with polycarbonate plasticC . Supply a duress alarm for personnel exposed to the...

May 28, 2022 No Comments READ MORE +

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?

Which of the following is used by the Point-to-Point Protocol (PPP) to determine packet formats?A . Layer 2 Tunneling Protocol (L2TP)B . Link Control Protocol (LCP)C . Challenge Handshake Authentication Protocol (CHAP)D . Packet Transfer Protocol (PTP)View AnswerAnswer: B

May 28, 2022 No Comments READ MORE +

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?

Recovery strategies of a Disaster Recovery planning (DRIP) MUST be aligned with which of the following?A . Hardware and software compatibility issuesB . Applications’ critically and downtime toleranceC . Budget constraints and requirementsD . Cost/benefit analysis and business objectivesView AnswerAnswer: D

May 28, 2022 No Comments READ MORE +

Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?

An external attacker has compromised an organization’s network security perimeter and installed a sniffer onto an inside computer . Which of the following is the MOST effective layer of security the organization could have implemented to mitigate the attacker’s ability to gain further information?A . Implement packet filtering on the...

May 27, 2022 No Comments READ MORE +

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?

Which of the following is an authentication protocol in which a new random number is generated uniquely for each login session?A . Challenge Handshake Authentication Protocol (CHAP)B . Point-to-Point Protocol (PPP)C . Extensible Authentication Protocol (EAP)D . Password Authentication Protocol (PAP)View AnswerAnswer: A

May 27, 2022 No Comments READ MORE +

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?

Which of the following is a PRIMARY benefit of using a formalized security testing report format and structure?A . Executive audiences will understand the outcomes of testing and most appropriate next steps for corrective actions to be takenB . Technical teams will understand the testing objectives, testing strategies applied, and...

May 27, 2022 No Comments READ MORE +