Which of the following BEST indicates that valid credentials were used?

A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?A . The scan results show open ports, protocols, and services exposed on the target hostB . The scan enumerated software versions of installed programsC ....

March 4, 2021 No Comments READ MORE +

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?

Which of the following provides the BEST protection for sensitive information and data stored in cloud-based services but still allows for full functionality and searchability of data within the cloud-based services?A . Data encryptionB . Data maskingC . AnonymizationD . TokenizationView AnswerAnswer: A

March 4, 2021 No Comments READ MORE +

Which of the following technologies should the IT manager use when implementing MFA?

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly. Which of the following technologies should the IT manager use when implementing MFA?A . One-time passwordsB . Email tokensC . Push notificationsD . Hardware authenticationView AnswerAnswer: C

February 12, 2021 No Comments READ MORE +

Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?A . ContainerizationB . GeofencingC . Full-disk encryptionD . Remote wipeView...

February 12, 2021 No Comments READ MORE +

Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization’s security posture?

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be...

February 11, 2021 No Comments READ MORE +

Which of the following control sets should a well-written BCP include? (Select THREE)

Which of the following control sets should a well-written BCP include? (Select THREE)A . PreventiveB . DetectiveC . DeterrentD . CorrectiveE . CompensatingF . PhysicalG . RecoveryView AnswerAnswer: A,D,G

February 11, 2021 No Comments READ MORE +

Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...

February 11, 2021 No Comments READ MORE +

Which of the following would MOST likely support the integrity of a voting machine?

Which of the following would MOST likely support the integrity of a voting machine?A . Asymmetric encryptionB . BlockchainC . Transport Layer SecurityD . Perfect forward secrecyView AnswerAnswer: D

February 11, 2021 No Comments READ MORE +

The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:

The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:A . data controller.B . data ownerC . data custodian.D . data processorView AnswerAnswer: D

February 11, 2021 No Comments READ MORE +

Which of the following types of controls should be used to reduce the risk created by this scenario?

A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers the company is unable to upgrade the encryption standard. Which of the following types of...

February 10, 2021 No Comments READ MORE +