Which of the following be the BEST risk indicator for this system?

Correct Answer for the Question – Which of the following be the BEST risk indicator for this system? is given below A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contracts that are no longer in use.The contracts contain intellectual property and have a data … Read more

Which of the following risk response strategies is being used?

Correct Answer for the Question – Which of the following risk response strategies is being used? is given below The finance department has started to use a new payment system that requires strict PII security restrictions on various network devices. The company decides to enforce the restrictions and configure all devices appropriately. Which of the following … Read more

Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in secure environment?

Correct Answer for the Question – Which of the following describes a contract that is used to define the various levels of maintenance to be provided by an external business vendor in secure environment? is given below Which of the following describes a contract that is used to define the various levels of maintenance to be … Read more

Which of the following tools should the engineer load onto the device being designed?

Correct Answer for the Question – Which of the following tools should the engineer load onto the device being designed? is given below A security engineer has been hired to design a device that will enable the exfiltration of data from within a well-defended network perimeter during an authorized test. The device must bypass all firewalls … Read more

Which of the following is the MOST likely vulnerability in this ERP platform?

Correct Answer for the Question – Which of the following is the MOST likely vulnerability in this ERP platform? is given below An internal staff member logs into an ERP platform and clicks on a record. The browser URL changes to:URL: http://192.168.0.100/ERP/accountId=5&action=SELECTWhich of the following is the MOST likely vulnerability in this ERP platform? Brute forcing … Read more

Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques?

Correct Answer for the Question – Which of the following would be the BEST choice to help the new team member learn bleeding-edge techniques? is given below A firewall specialist has been newly assigned to participate in red team exercises and needs to ensure the skills represent real-world threats.Which of the following would be the BEST … Read more

Which of the following should the Chief Information Security Officer (CISO) recommend implementing?

Correct Answer for the Question – Which of the following should the Chief Information Security Officer (CISO) recommend implementing? is given below Staff members are reporting an unusual number of device thefts associated with time out of the office. Thefts increased soon after the company deployed a new social networking app. Which of the following should … Read more

Which of the following is the BEST way to test awareness?

Correct Answer for the Question – Which of the following is the BEST way to test awareness? is given below Following a recent network intrusion, a company wants to determine the current security awareness of all of its employees. Which of the following is the BEST way to test awareness? Conduct a series of security training … Read more

Which of the following communication methods would be BEST to recommend?

Correct Answer for the Question – Which of the following communication methods would be BEST to recommend? is given below The Chief Executive Officers (CEOs) from two different companies are discussing the highly sensitive prospect of merging their respective companies together.Both have invited their Chief Information Officers (CIOs) to discern how they can securely and digitaly … Read more

Which of the following is the MOST appropriate order of steps to be taken?

Correct Answer for the Question – Which of the following is the MOST appropriate order of steps to be taken? is given below A company is transitioning to a new VDI environment, and a system engineer is responsible for developing a sustainable security strategy for the VDIs.Which of the following is the MOST appropriate order of … Read more