Given the request by the CFO, which of the following controls should the CISO focus on in the report?
A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO) to provide responses to a recent audit report detailing deficiencies in the organization security controls. The CFO would like to know ways in which the organization can improve its authorization controls. Given the request by the CFO, which...
In this scenario, which of the following will occur when users try to authenticate to the portal?
A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords, The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will...
Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?
Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?A . Logic bombB . TrojanC . ScarewareD . RansomwareView AnswerAnswer: A
Which of the following technical controls would help prevent these policy violations?
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select TWO).A . Password expirationB . Password lengthC . Password complexityD . Password historyE . Password lockoutView AnswerAnswer: CD Explanation: Complexity...
The controls used by the receptionist are in place to prevent which of the following types of attacks?
An attacker wearing a building maintenance uniform approached a company's receptionist asking for access to a secure area. The receptionist asks for identification, a building access badge and checks the company's list approved maintenance personnel prior to granting physical access to the secure are. The controls used by the receptionist...
Drag and Drop Question
Drag and Drop Question A Security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and Drop the applicable controls to each asset type. Instructions: Controls can be used multiple times and not all placeholders needs to be filled....
Which of the following technical controls MUST be in place in order to promote the use of passphrases?
Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of passphrases?A . ReuseB . LengthC . HistoryD . ComplexityView AnswerAnswer: D
With which of the following is the device MOST likely infected?
Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: - Slow performance - Word documents, PDFs, and images no longer opening - A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her....
Which of the following has the administrator been tasked to perform?
A security administrator is tasked with conducting an assessment made to establish the baseline security posture of the corporate IT infrastructure. The assessment must report actual flaws and weaknesses in the infrastructure. Due to the expense of hiring outside consultants, the testing must be performed using in-house or cheaply available...
Which of the following types of keys is found in a key escrow?
Which of the following types of keys is found in a key escrow?A . PublicB . PrivateC . SharedD . SessionView AnswerAnswer: B Explanation: https://www.professormesser.com/security-plus/sy0-401/key-escrow-3/