which of the following techniques supports availability?
When considering a vendor-specific vulnerability in critical industrial control systems which of the
following techniques supports availability?
which of the following information is MOST likely required?
During the information gathering stage of a deploying role-based access control model, which of
the following information is MOST likely required?
Which of the following is the BEST method to prevent such activities in the future?
The Chief Technical Officer (CTO) has been informed of a potential fraud committed by a
database administrator performing several other job functions within the company. Which of the
following is the BEST method to prevent such activities in the future?
Which of the following will accomplish this task securely?
Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?
Which of the following would be the BEST technology control to use in this scenario?
A company is trying to limit the risk associated with the use of unapproved USB devices to copy
documents. Which of the following would be the BEST technology control to use in this scenario?
Which of the following BEST meets their goal?
A company is trying to implement physical deterrent controls to improve the overall security
posture of their data center. Which of the following BEST meets their goal?
Which of the following controls could they implement to BEST meet this goal?
A company’s employees were victims of a spear phishing campaign impersonating the CEO. The
company would now like to implement a solution to improve the overall security posture by
assuring their employees that email originated from the CEO. Which of the following controls could
they implement to BEST meet this goal?
Which of the following actions would BEST accomplish this goal?
A security technician is attempting to improve the overall security posture of an internal mail
server. Which of the following actions would BEST accomplish this goal?
Which of the following would BEST prevent the disclosure of customer data in the event that a tablet is lost
A bank has recently deployed mobile tablets to all loan officers for use at customer sites. Which of
the following would BEST prevent the disclosure of customer data in the event that a tablet is lost
or stolen?
Which of the following is the primary security concern when deploying a mobile device on a network?
Which of the following is the primary security concern when deploying a mobile device on a
network?