Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?
Several departments within a company have a business need to send high volumes of confidential
information to customers via email. Which of the following is the BEST solution to mitigate
unintentional exposure of confidential information?
Which of the following controls support this goal?
After recovering from a data breach in which customer data was lost, the legal team meets with
the Chief Security Officer (CSO) to discuss ways to better protect the privacy of customer data.
Which of the following controls support this goal?
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user from
their company email account to another address external to the company. These messages were
sent prior to a company data breach, which prompted the security audit. The user was one of a
few people who had access to the leaked data. Review of the suspect’s emails show they consist
mostly of pictures of the user at various locations during a recent vacation. No suspicious activities
from other users who have access to the data were discovered.
Which of the following is occurring?
Which of the following describes how the employee is leaking these secrets?
A security analyst has been notified that trade secrets are being leaked from one of the executives
in the corporation. When reviewing this executive’s laptop they notice several pictures of the
employee’s pets are on the hard drive and on a cloud storage network. When the analyst hashes
the images on the hard drive against the hashes on the cloud network they do not match.
Which of the following describes how the employee is leaking these secrets?
which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?
which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data
into a string of characters?
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the
password is hashed. This technique is known as:
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following concepts describes the use of a one way transformation in order to validate the integri
Which of the following concepts describes the use of a one way transformation in order to validate
the integrity of a program?
Which of the following should the security administrator use to identify similar malware?
The security administrator is implementing a malware storage system to archive all malware seen
by the company into a central database. The malware must be categorized and stored based on
similarities in the code. Which of the following should the security administrator use to identify
similar malware?