Which of the following should a company implement to BE…
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing
on employees’ computers?
Which of the following BEST addresses these requirement…
A security administrator wants to implement a solution which will allow some applications to run under the
user’s home directory and only have access to files stored within the same user’s folder, while otherapplications have access to shared folders. Which of the following BEST addresses these requirements if the
environment is concurrently shared by multiple users?
Which of the following security best practices is the s…
A Human Resources user is issued a virtual desktop typically assigned to Accounting employees. A system
administrator wants to disable certain services and remove the local accounting groups installed by default on
this virtual machine.
Which of the following security best practices is the system administrator adhering to?
Which of the following devices would be the MOST effici…
Which of the following devices would be the MOST efficient way to filter external websites for staff on an
internal network?
which of the following techniques supports availability?
When considering a vendor-specific vulnerability in critical industrial control systems which of the following
techniques supports availability?
Which of the following are examples of network segmentation?
Which of the following are examples of network segmentation? (Choose two.)
Which of the following is MOST likely to protect the SC…
During a recent investigation, an auditor discovered that an engineer’s compromised workstation was being
used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for
administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems
cannot be modified without vendor approval which requires months of testing.
Which of the following is MOST likely to protect the SCADA systems from misuse?
Which of the following is the MOST secure method to dis…
Company XYZ recently salvaged company laptops and removed all hard drives, but the Chief Information
Officer (CIO) is concerned about disclosure of confidential information. Which of the following is the MOST
secure method to dispose of these hard drives?
The act of magnetically erasing all of the data on a di…
The act of magnetically erasing all of the data on a disk is known as:
Which of the following can be implemented?
An administrator wants to ensure that the reclaimed space of a hard drive has been sanitized while the
computer is in use. Which of the following can be implemented?