Which of the following would BEST protect the company from data exfiltration via removable media?

A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...

January 30, 2021 No Comments READ MORE +

Which of the following access control schemes would be BEST for the company to implement?

A company processes highly sensitive data and senior management wants to protect the sensitive data by utilizing classification labels. Which of the following access control schemes would be BEST for the company to implement?A . DiscretionaryB . Rule-basedC . Role-basedD . MandatoryView AnswerAnswer: D

January 30, 2021 No Comments READ MORE +

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.A . validate the vulnerability exists in the organization's network through penetration testingB . research the appropriate mitigation techniques in a vulnerability databaseC . find the software patches that are...

January 29, 2021 No Comments READ MORE +

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?A . Least privilegeB . Awareness trainingC . Separation of dutiesD . Mandatory vacationView AnswerAnswer: C

January 29, 2021 No Comments READ MORE +

Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?A . PCI...

January 29, 2021 No Comments READ MORE +

Which of the following would BEST assist the company?

A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?A . MSSPB . SOARC . IaaSD . PaaSView AnswerAnswer: B

January 29, 2021 No Comments READ MORE +

Which of the following should the engineer do to determine the issue?

A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should...

January 29, 2021 No Comments READ MORE +

Which of the following describes the ability of code to target a hypervisor from inside

Which of the following describes the ability of code to target a hypervisor from insideA . Fog computingB . VM escapeC . Software-defined networkingD . Image forgeryE . Container breakoutView AnswerAnswer: B

January 29, 2021 No Comments READ MORE +

Which of the following is the analyst MOST likely seeing?

A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing? A) B) C) D) A . Option AB . Option BC . Option CD . Option...

January 28, 2021 No Comments READ MORE +

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)A . Data accessibilityB . Legal holdC . Cryptographic or hash algorithmD . Data retention legislationE . Value and volatility of dataF . Right-to-audit clausesView AnswerAnswer: E,F

January 28, 2021 No Comments READ MORE +