Which of the following changes to the security configuration of the accounts payable module would BEST mitigate the risk?
An organization’s internal auditor discovers that large sums of money have recently been paid to a vendor that management does not recognize. The IT security department is asked to investigate the organizations the organization’s ERP system to determine how the accounts payable module has been used to make these vendor...
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?A . CA public keyB . Server private keyC . CSRD . OIDView AnswerAnswer: D
Which of the following technical controls would help prevent these policy violations?
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Choose two.)A . Password expirationB . Password lengthC . Password complexityD . Password historyE . Password lockoutView AnswerAnswer: CD
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?A . OwnerB . SystemC . AdministratorD . UserView AnswerAnswer: C
Given the information provided, which of the following MOST likely occurred on the workstation?
A security analyst observes the following events in the logs of an employee workstation: Given the information provided, which of the following MOST likely occurred on the workstation?A . Application whitelisting controls blocked an exploit payload from executing.B . Antivirus software found and quarantined three malware files.C . Automatic updates...
Which of the following types of backups would be MOST appropriate for the particular file server?
An organization's file server has been virtualized to reduce costs. Which of the following types of backups would be MOST appropriate for the particular file server?A . SnapshotB . FullC . IncrementalD . DifferentialView AnswerAnswer: C
Which of the following terms BEST describes the security control being employed?
Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following terms BEST describes the security control being employed?A . AdministrativeB . CorrectiveC . DeterrentD . CompensatingView AnswerAnswer: A
Which of the following forms of authentication are being used?
A company is currently using the following configuration: - IAS server with certificate-based EAP-PEAP and MSCHAP - Unencrypted authentication via PAP A security administrator needs to configure a new wireless setup with the following configurations: - PAP authentication method - PEAP and EAP provide two-factor authentication Which of the following...
Which of the following best describes what she will do?
Ann, a security administrator, has been instructed to perform fuzz-based testing on the company's applications. Which of the following best describes what she will do?A . Enter random or invalid data into the application in an attempt to cause it to faultB . Work with the developers to eliminate horizontal...
Which of the following should the analyst implement to meet these requirements?
A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Choose two.) A. Generate an X.509-compliant certificate that...