Which of the following will ensure the administrator is…
The security administrator is currently unaware of an incident that occurred a week ago. Which of the following
will ensure the administrator is notified in a timely manner in the future?
Which of the following has the organization failed to p…
After an audit, it was discovered that the security group memberships were not properly adjusted for
employees’ accounts when they moved from one role to another. Which of the following has the organization
failed to properly implement? (Choose two.)
Which of the following risk mitigation strategies would…
Various network outages have occurred recently due to unapproved changes to network and security devices.
All changes were made using various system credentials. The security analyst has been tasked to update the
security policy. Which of the following risk mitigation strategies would also need to be implemented to reduce
the number of network outages due to unauthorized changes?
Which of the following BEST describes the procedure and…
A security administrator is responsible for performing periodic reviews of user permission settings due to high
turnover and internal transfers at a corporation. Which of the following BEST describes the procedure and
security rationale for performing such reviews?
Which mitigation measure would detect and correct this?
An internal auditor is concerned with privilege creep that is associated with transfers inside the company. Which
mitigation measure would detect and correct this?
Which of the following is the BEST approach to perform …
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
which of the following?
Requiring technicians to report spyware infections is a step in which of the following?
Which of the following strategies should be implemented…
A security analyst informs the Chief Executive Officer (CEO) that a security breach has just occurred. This
results in the Risk Manager and Chief Information Officer (CIO) being caught unaware when the CEO asks for
further information. Which of the following strategies should be implemented to ensure the Risk Manager and
CIO are not caught unaware in the future?
Which of the following is BEST carried out immediately …
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following should the user do NEXT?
A user has received an email from an external source which asks for details on the company’s new product line
set for release in one month. The user has a detailed spec sheet but it is marked “Internal Proprietary
Information”. Which of the following should the user do NEXT?