Which of the following risks is MOST likely to affect the business on a day-to-day basis?
A company is looking to improve their security posture by addressing risks uncovered by a recent
penetration test. Which of the following risks is MOST likely to affect the business on a day-to-day
basis?
which of the following attacks?
Ann, an employee, is cleaning out her desk and disposes of paperwork containing confidential
customer information in a recycle bin without shredding it first. This is MOST likely to increase the
risk of loss from which of the following attacks?
Which of the following could BEST prevent this issue from occurring again?
A recently installed application update caused a vital application to crash during the middle of the
workday. The application remained down until a previous version could be reinstalled on the
server, and this resulted in a significant loss of data and revenue.
Which of the following could BEST prevent this issue from occurring again?
Which of the following BEST addresses this concern?
A security administrator wishes to increase the security of the wireless network. Which of the
following BEST addresses this concern?
Which of the following risk mitigation strategies is MOST important to the security manager?
The system administrator has deployed updated security controls for the network to limit risk of
attack. The security manager is concerned that controls continue to function as intended to
maintain appropriate security posture.
Which of the following risk mitigation strategies is MOST important to the security manager?
Which of the following should the administrator use to test the patching process quickly and often?
A company is about to release a very large patch to its customers. An administrator is required to
test patch installations several times prior to distributing them to customer PCs.
Which of the following should the administrator use to test the patching process quickly and often?
Which of the following will MOST increase the security of the passwords?
An auditing team has found that passwords do not meet best business practices. Which of the
following will MOST increase the security of the passwords? (Select TWO).
Which of the following describes this cause?
A vulnerability scan is reporting that patches are missing on a server. After a review, it is
determined that the application requiring the patch does not exist on the operating system.
Which of the following describes this cause?
Which of the following would have assured that the bid was submitted by Company A?
Company A submitted a bid on a contract to do work for Company B via email. Company B was
insistent that the bid did not come from Company A. Which of the following would have assured
that the bid was submitted by Company A?
Which of the following is MOST likely the reason?
Ann, a sales manager, successfully connected her company-issued smartphone to the wireless
network in her office without supplying a username/password combination. Upon disconnecting
from the wireless network, she attempted to connect her personal tablet computer to the same
wireless network and could not connect.
Which of the following is MOST likely the reason?