Which of the following would be most relevant for the analyst to evaluate?
An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?A . Secured zonesB . Subject roleC . Adaptive identityD . Threat scope reductionView AnswerAnswer: D Explanation: The data plane, also known as the...
Which of the following security control types does an acceptable use policy best represent?
Which of the following security control types does an acceptable use policy best represent?A . DetectiveB . CompensatingC . CorrectiveD . PreventiveView AnswerAnswer: D Explanation: An acceptable use policy (AUP) is a set of rules that govern how users can access and use a corporate network or the internet. The...
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?A . JailbreakingB . Memory injectionC . Resource reuseD . Side loadingView AnswerAnswer: D Explanation: Side loading is the process of installing software outside of a manufacturer’s approved software repository. This can expose the...
Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the...
Which of the following types of sites is the best for this scenario?
An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?A . Real-time recoveryB . HotC . ColdD . WarmView AnswerAnswer: C Explanation: A cold...
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?A . SCAPB . Net FlowC . AntivirusD . DLPView AnswerAnswer: D Explanation: DLP stands for Data Loss Prevention, which is a tool that can assist with detecting and preventing...