Which of the following describes the BEST approach for deploying application patches?
Which of the following describes the BEST approach for deploying application patches?A . Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.B . Test the patches in a staging environment, develop against them in the development environment, and...
Which of the following BEST represents this type of threat?
The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls. Which of the following BEST represents this type of threat?A . A script kiddieB . Shadow ITC . HacktivismD . White-hatView AnswerAnswer: B
Which of the following must be less than 12 hours to maintain a positive total cost of ownership?
A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?A . MTBFB . RPOC...
Which of the following types of controls should be used to reduce the risk created by this scenario?
A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard. Which of the following types of...
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?
Which of the following incident response steps involves actions to protect critical systems while maintaining business operations?A . InvestigationB . ContainmentC . RecoveryD . Lessons learnedView AnswerAnswer: B
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?
When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?A . TokenizationB . Data maskingC . NormalizationD . ObfuscationView AnswerAnswer: C
Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?
The CSIRT is reviewing the lessons learned from a recent incident. A worm was able to spread unhindered throughout the network and infect a large number of computers and servers. Which of the following recommendations would be BEST to mitigate the impacts of a similar incident in the future?A ....
Which of the following would BEST these requirement?
A security engineer at an offline government facility is concerned about the validity of an SSL certificate. The engineer wants to perform the fastest check with the least delay to determine if the certificate has been revoked. Which of the following would BEST these requirement?A . RAB . OCSPC ....
Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?
Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?A . DLPB . HIDSC . EDRD . NIPSView AnswerAnswer: C
Which of the following files should be given to the forensics firm?
A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?A . SecurityB . ApplicationC . DumpD . SyslogView...