An annual audit of the business partner is conducted against the SLA in order to verify:
A company exchanges information with a business partner. An annual audit of the business partner is
conducted against the SLA in order to verify:
Which of the following is the proper way to quantify the total monetary damage resulting from an exploited vul
Which of the following is the proper way to quantify the total monetary damage resulting from an
exploited vulnerability?
Which of the following BEST describes this type of IDS?
A security administrator needs to implement a system that detects possible intrusions based upon a
vendor provided list. Which of the following BEST describes this type of IDS?
which of the following is the CSO most likely to reduce the number of incidents?
The chief Security Officer (CSO) has reported a rise in data loss but no break ins have occurred. By doing
which of the following is the CSO most likely to reduce the number of incidents?
when should this problem BEST be revisited?
During a data breach cleanup it is discovered that not all of the sites involved have the necessary data
wiping tools. The necessary tools are quickly distributed to the required technicians, but when should this
problem BEST be revisited?
which of the following should be taken into consideration when installing the new locks?
New magnetic locks were ordered for an entire building. In accordance with company policy, employee
safety is the top priority. In case of a fire where electricity is cut, which of the following should be taken
into consideration when installing the new locks?
which of the following reasons should administrator take advantage of the Subject Alternative Name (SAM) attri
A security administrator is trying to encrypt communication. For which of the following reasons should
administrator take advantage of the Subject Alternative Name (SAM) attribute of a certificate?
Which of the following actions are MOST appropriate to harden applications against infiltration by former empl
After a merger between two companies a security analyst has been asked to ensure that the
organization’s systems are secured against infiltration by any former employees that were terminated
during the transition. Which of the following actions are MOST appropriate to harden applications against
infiltration by former employees? (Select TWO)
Which of the following security activities should also have been performed to discover vulnerabilities earlier
A new mobile application is being developed in-house. Security reviews did not pick up any major flaws,
however vulnerability scanning results show fundamental issues at the very end of the project cycle.
Which of the following security activities should also have been performed to discover vulnerabilities
earlier in the lifecycle?
Which of the following subnets would BEST meet the requirements?
A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ
which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST
meet the requirements?