Which of the following would be the MOST effective way for the security team to meet these objectives?
The security team at a large corporation is helping the payment-processing team to prepare for a regulatory compliance audit and meet the following objectives: ✑ Reduce the number of potential findings by the auditors. ✑ Limit the scope of the audit to only devices used by the payment-processing team for...
Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?
A Chief Information Security Officer (CISO) wants to upgrade an organization's security posture by improving proactive activities associated with attacks from internal and external threats. Which of the following is the MOST proactive tool or technique that feeds incident response capabilities?A . Development of a hypothesis as part of threat...
Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?
An organization developed a comprehensive incident response policy. Executive management approved the policy and its associated procedures . Which of the following activities would be MOST beneficial to evaluate personnel’s familiarity with incident response procedures?A . A simulated breach scenario involving the incident response team B. Completion of annual information...
Which of the following strategies would put the company in the BEST position to achieve the desired recovery time?
A large software company wants to move «s source control and deployment pipelines into a cloud-computing environment. Due to the nature of the business management determines the recovery time objective needs to be within one hour . Which of the following strategies would put the company in the BEST position...
Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?
Which of the following technologies can be used to store digital certificates and is typically used in high-security implementations where integrity is paramount?A . HSM B. eFuse C. UEFI D. Self-encrypting driveView AnswerAnswer: A
Which of the following should be performed NEXT to investigate the availability issue?
A system is experiencing noticeably slow response times, and users are being locked out frequently. An analyst asked for the system security plan and found the system comprises two servers: an application server in the DMZ and a database server inside the trusted domain . Which of the following should...
Which of the following is the value of this risk?
A security analyst discovers a vulnerability on an unpatched web server that is used for testing machine learning on Bing Data sets. Exploitation of the vulnerability could cost the organization $1.5 million in lost productivity. The server is located on an isolated network segment that has a 5% chance of...
A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http://<malwaresource>/A.php in a phishing email.
A security analyst suspects a malware infection was caused by a user who downloaded malware after clicking http://<malwaresource>/A.php in a phishing email. To prevent other computers from being infected by the same malware variation, the analyst should create a rule on the. A. email server that automatically deletes attached executables....
Which of the following should be considered FIRST prior to disposing of the electronic data?
An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?A . Sanitization policy B. Data sovereignty C. Encryption policy D. Retention standardsView AnswerAnswer: D
When of the following would be the BEST integration option for the service?
An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST integration option for the service?A . Manually log in to the service and upload data files on a regular basis. B. Have the internal...