Which of the following is MOST likely to protect the SCADA systems from misuse?
During a recent investigation, an auditor discovered that an engineer’s compromised workstation
was being used to connect to SCADA systems while the engineer was not logged in. The engineer
is responsible for administering the SCADA systems and cannot be blocked from connecting to
them. The SCADA systems cannot be modified without vendor approval which requires months of
testing.
Which of the following is MOST likely to protect the SCADA systems from misuse?
Which of the following should the administrator implement?
A security administrator must implement a network authentication solution which will ensure
encryption of user credentials when users enter their username and password to authenticate to
the network.
Which of the following should the administrator implement?
Which of the following would be the BEST control to implement?
Several employees have been printing files that include personally identifiable information of
customers. Auditors have raised concerns about the destruction of these hard copies after they
are created, and management has decided the best way to address this concern is by preventing
these files from being printed.
Which of the following would be the BEST control to implement?
Which of the following controls is preventing them from completing their work?
The company’s sales team plans to work late to provide the Chief Executive Officer (CEO) with a
special report of sales before the quarter ends. After working for several hours, the team finds they
cannot save or print the reports.
Which of the following controls is preventing them from completing their work?
Which of the following provide the BEST protection against brute forcing stored passwords?
A security engineer is asked by the company’s development team to recommend the most secure
method for password storage.
Which of the following provide the BEST protection against brute forcing stored passwords?
(Select TWO).
Which of the following is preventing the device from connecting?
After entering the following information into a SOHO wireless router, a mobile device’s user
reports being unable to connect to the network:
PERMIT 0A: D1: FA. B1: 03: 37
DENY 01: 33: 7F: AB: 10: AB
Which of the following is preventing the device from connecting?
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled
games on company computers and this is reducing productivity.
Which of the following would be MOST effective for preventing this behavior?
which of the following ciphers would a user need to specify the key strength?
When creating a public / private key pair, for which of the following ciphers would a user need to
specify the key strength?
Which of the following types of interoperability agreement is this?
A company has decided to move large data sets to a cloud provider in order to limit the costs of
new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make
sure both parties have a clear understanding of the controls needed to protect the data.
Which of the following types of interoperability agreement is this?
Which of the following solutions provides the most flexibility when testing new security controls prior to imp
Which of the following solutions provides the most flexibility when testing new security controls
prior to implementation?