Which of the following is the BEST approach?
A company wants to ensure confidential data from its storage media files is sanitized so the drives cannot oe reused. Which of the following is the BEST approach?A . DegaussingB . ShreddingC . FormattingD . EncryptingView AnswerAnswer: B Explanation: https://legalshred.com/degaussing-vs-hard-drive-shredding/ The best and most secure method of rendering hard drive...
Which of the following is the BEST approach to prevent any impact to the company from similar attacks in the future?
A company is experiencing a malware attack within its network. A security engineer notices many of the impacted assets are connecting outbound to a number of remote destinations and exfiltrating data. The security engineer also see that deployed, up-to-date antivirus signatures are ineffective. Which of the following is the BEST...
Which of the following technologies should the analyst implement to provide secure transport?
A security analyst needs to provide the development learn with secure connectivity from the corporate network to a three-tier cloud environment. The developers require access to servers in all three tiers in order to perform various configuration tasks. Which of the following technologies should the analyst implement to provide secure...
Which of the following BEST describes HSM?
Which of the following BEST describes HSM?A . A computing device that manages cryptography, decrypts traffic, and maintains library callsB . A computing device that manages digital keys, performs encryption/decryption functions, and maintains other cryptographic functionsC . A computing device that manages physical keys, encrypts devices, and creates strong cryptographic...
Which of the following is the MOST accurate method for the security analyst to complete this assignment?
An organization is focused on restructuring its data governance programs and an analyst has been Tasked with surveying sensitive data within the organization. Which of the following is the MOST accurate method for the security analyst to complete this assignment?A . Perform an enterprise-wide discovery scan.B . Consult with an...
Which of the following describes what has occurred?
A security analyst discovers suspicious host activity while performing monitoring activities. The analyst pulls a packet capture for the activity and sees the following: Which of the following describes what has occurred?A . The host attempted to download an application from utoftor.com.B . The host downloaded an application from utoftor.com.C...
Which of the following BEST explains the function of trusted firmware updates as they relate to hardware assurance?
Which of the following BEST explains the function of trusted firmware updates as they relate to hardware assurance?A . Trusted firmware updates provide organizations with development, compilation, remote access, and customization for embedded devices.B . Trusted firmware updates provide organizations with security specifications, open-source libraries, and custom toots for embedded...
Which of the following types of controls defines placing an ACL on a file folder?
Which of the following types of controls defines placing an ACL on a file folder?A . Technical controlB . Confidentiality controlC . Managerial controlD . Operational controlView AnswerAnswer: A Explanation: "Technical controls enforce confidentiality, integrity, and availability in the digital space. Examples of technical security controls include firewall rules, access...
Which of the following is the NEXT step that should be completed to obtain information about the software company's security posture?
A business recently acquired a software company. The software company's security posture is unknown. However, based on an assessment, there are limited security controls. No significant security monitoring exists. Which of the following is the NEXT step that should be completed to obtain information about the software company's security posture?A...
Which of the following controls must be in place to prevent this vulnerability?
A security analyst found an old version of OpenSSH running on a DMZ server and determined the following piece of code could have led to a command execution through an integer overflow; Which of the following controls must be in place to prevent this vulnerability?A . Convert all integer numbers...