The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:A . risk aggregation.B . risk prioritization.C . risk elimination.D . risk quantificationView AnswerAnswer: B

September 2, 2024 No Comments READ MORE +

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?A . VPNB . IPsecC . SSHD . SFTPView AnswerAnswer: C

September 1, 2024 No Comments READ MORE +

What is the MAIN consideration when storing backup files?

What is the MAIN consideration when storing backup files?A . Utilizing solid slate device (SSDJ media for quick recoveryB . Storing backup files on public cloud storageC . Protecting the off-site data backup copies from unauthorized accessD . Storing copies on-site for ease of access during incident responseView AnswerAnswer: C

September 1, 2024 No Comments READ MORE +

What does this requirement mean?

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?A . Ensure the emails are encrypted and provide nonrepudiation.B . Provide a backup of emails in the event of a disasterC . isolate the emails and test for malicious contentD . Guarantee rapid email delivery...

September 1, 2024 No Comments READ MORE +

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?A . DetectB . IdentifyC . RecoverD . RespondView AnswerAnswer: B

September 1, 2024 No Comments READ MORE +

Which process converts extracted information to a format understood by investigators?

Which process converts extracted information to a format understood by investigators?A . ReportingB . IngestionC . imagingD . FilteringView AnswerAnswer: A

September 1, 2024 No Comments READ MORE +

Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?

Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?A . Reviewing business impact analysis (BIA) resultsB . Regularly benchmarking the number of new vulnerabilities identified with industry peersC . Tracking vulnerabilities and the remediation efforts to mitigate themD . Monitoring...

August 30, 2024 No Comments READ MORE +

in key protection/management, access should be aligned with which of the following?

in key protection/management, access should be aligned with which of the following?A . System limitationB . Least privilegeC . Position responsibilitiesD . Role descriptionsView AnswerAnswer: B

August 30, 2024 No Comments READ MORE +

The protection of information from unauthorized access or disclosure is known as:

The protection of information from unauthorized access or disclosure is known as:A . access control.B . cryptographC . media protect on.D . confidentiality.View AnswerAnswer: D

August 29, 2024 No Comments READ MORE +

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?A . It is more secureB . It is more reliableC . It is higher speed.D . It is more cost effective.View AnswerAnswer: D

August 29, 2024 No Comments READ MORE +