Which of the following is MOST likely affected?
Matt, a developer, recently attended a workshop on a new application. The developer installs the new
application on a production system to test the functionality. Which of the following is MOST likely
affected?
Which of the following is the MOST important activity that should be considered?
In order to maintain oversight of a third party service provider, the company is going to implement a
Governance, Risk, and Compliance (GRC) system. This system is promising to provide overall security
posture coverage. Which of the following is the MOST important activity that should be considered?
Which of the following job responsibilities is the analyst performing?
A security analyst performs the following activities: monitors security logs, installs surveillance cameras
and analyzes trend reports. Which of the following job responsibilities is the analyst performing? (Select
TWO).
Which of the following is an indication of an ongoing current problem?
Which of the following is an indication of an ongoing current problem?
Which of the following is a notification that an unusual condition exists and should be investigated?
Which of the following is a notification that an unusual condition exists and should be investigated?
Which of the following supports this requirement?
A security manager must remain aware of the security posture of each system. Which of the following
supports this requirement?
Which of the following security devices needs to be configured to disable future false alarms?
Suspicious traffic without a specific signature was detected. Under further investigation, it was
determined that these were false indicators. Which of the following security devices needs to be
configured to disable future false alarms?
Which of the following is designed to stop an intrusion on a specific server?
Jane, a security administrator, has observed repeated attempts to break into a server. Which of the
following is designed to stop an intrusion on a specific server?
Which of the following tools will allow a technician to detect security-related TCP connection anomalies?
Which of the following tools will allow a technician to detect security-related TCP connection anomalies?
Which of the following would a security administrator implement in order to identify a problem between two sys
Which of the following would a security administrator implement in order to identify a problem between
two systems that are not communicating properly?