what the company?
Six months into development, the core team assigned to implement a new internal piece of software
must convene to discuss a new requirement with the stake holders. A stakeholder identified a missing
feature critical to the organization, which must be implemented. The team needs to validate the
feasibility of the newly introduced requirement and ensure it does not introduce new vulnerabilities to
the software and other applications that will integrate with it. Which of the following BEST describes what
the company?
which of the following?
A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation,
the supervisor terminates an employee as a result of the suspected data loss. During the investigation,
the supervisor is absent for the interview, and little evidence can be provided form the role-based
authentication system in use by the company. The situation can be identified for future mitigation as
which of the following?
Which of the following methods should the security administrator select the best balances security and efficie
A security administrator needs an external vendor to correct an urgent issue with an organization’s
physical access control system (PACS). The PACS does not currently have internet access because it is
running a legacy operation system. Which of the following methods should the security administrator
select the best balances security and efficiency?
Which of the following is the MOST critical for immediate recovery?
A datacenter manager has been asked to prioritize critical system recovery priorities. Which of the
following is the MOST critical for immediate recovery?
Which of the following techniques can be bypass a user or computer’s web browser privacy settings?
Which of the following techniques can be bypass a user or computer’s web browser privacy settings?
(Select Two)
When designing a web based client server application with single application server and database cluster backe
When designing a web based client server application with single application server and database cluster
backend, input validation should be performed:
Which of the following delineates why it is important to perform egress filtering and monitoring on Internet c
Which of the following delineates why it is important to perform egress filtering and monitoring on
Internet connected security zones of interfaces on a firewall?
Which of the following controls should be implemented to curtail this activity?
The help desk is receiving numerous password change alerts from users in the accounting department.
These alerts occur multiple times on the same day for each of the affected users’ accounts. Which of the
following controls should be implemented to curtail this activity?
Which of the following would enhance the security of accessing data stored in the cloud?
Which of the following would enhance the security of accessing data stored in the cloud? (Select TWO)
Which of the following is preventing the remote user from being able to access the workstation?
A remote user (User1) is unable to reach a newly provisioned corporate windows workstation. The system
administrator has been given the following log files from the VPN, corporate firewall and workstation
host.
Which of the following is preventing the remote user from being able to access the workstation?