Which of the following will provide a trend of risk mitigation?
A newly appointed Chief Information Security Officer (CISO) has completed a risk assessment review of the organization and wants to reduce the numerous risks that were identified. Which of the following will provide a trend of risk mitigation?A . Risk responseB . Risk analysisC . PlanningD . OversightE . Continuous...
Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?
Which of the following technologies can be used to house the entropy keys for disk encryption on desktops and laptops?A . Self-encrypting driveB . Bus encryptionC . TPMD . HSMView AnswerAnswer: A
During a cyber incident, which of the following is the BEST course of action?
During a cyber incident, which of the following is the BEST course of action?A . Switch to using a pre-approved, secure, third-party communication system.B . Keep the entire company informed to ensure transparency and integrity during the incident.C . Restrict customer communication until the severity of the breach is confirmed.D...
Which of the following tools should the analyst use to obtain the data?
A security analyst needs to obtain the footprint of the network. The footprint must identify the following information; • TCP and UDP services running on a targeted system • Types of operating systems and versions • Specific applications and versions Which of the following tools should the analyst use to...
When of the following would be the BEST integration option for the service?
An executive assistant wants to onboard a new cloud based product to help with business analytics and dashboarding. When of the following would be the BEST integration option for the service?A . Manually log in to the service and upload data files on a regular basis.B . Have the internal...
Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue
HOTSPOT Welcome to the Enterprise Help Desk System. Please work the ticket escalated to you in the desk ticket queue. INSTRUCTIONS Click on me ticket to see the ticket details Additional content is available on tabs within the ticket First, select the appropriate issue from the drop-down menu. Then, select...
Which of the following commands should the analyst investigate FIRST?
During a routine log review, a security analyst has found the following commands that cannot be identified from the Bash history log on the root user. Which of the following commands should the analyst investigate FIRST?A . Line 1B . Line 2C . Line 3D . Line 4E . Line...
Which of the following MOST accurately describes an HSM?
Which of the following MOST accurately describes an HSM?A . An HSM is a low-cost solution for encryption.B . An HSM can be networked based or a removable USBC . An HSM is slower at encrypting than softwareD . An HSM is explicitly used for MFAView AnswerAnswer: A
While preparing of an audit of information security controls in the environment an analyst outlines a framework control that has the following requirements:
While preparing of an audit of information security controls in the environment an analyst outlines a framework control that has the following requirements: • All sensitive data must be classified • All sensitive data must be purged on a quarterly basis • Certificates of disposal must remain on file for...
Which of the following activities would be MOST beneficial to evaluate personnel's familiarity with incident response procedures?
An organization developed a comprehensive modern response policy Executive management approved the policy and its associated procedures. Which of the following activities would be MOST beneficial to evaluate personnel's familiarity with incident response procedures?A . A simulated breach scenario evolving the incident response teamB . Completion of annual information security...