Which of the following policies, when implemented, would allow the company to audit this employee’s work
Every year, the accounts payable employee, Ann, takes a week off work for a vacation. She
typically completes her responsibilities remotely during this week. Which of the following policies,
when implemented, would allow the company to audit this employee’s work and potentially
discover improprieties?
Which of the following problems would MOST likely be uncovered by this tool?
A new web based application has been developed and deployed in production. A security
engineer decides to use an HTTP interceptor for testing the application. Which of the following
problems would MOST likely be uncovered by this tool?
Which of the following techniques should the consultant use to discover the source of the information leaks?
A security consultant is investigating acts of corporate espionage within an organization. Each
time the organization releases confidential information to high-ranking engineers, the information
is soon leaked to competing companies. Which of the following techniques should the consultant
use to discover the source of the information leaks?
Which of the following is the MOST likely cause of the compromise?
A security administrator is investigating the compromise of a SCADA network that is not physically
connected to any other network. Which of the following is the MOST likely cause of the
compromise?
Which of the following risk strategies did the CISO implement?
The Chief Information Security Officer (CISO) at a company knows that many users store
business documents on public cloud-based storage; and realizes this is a risk to the company. In
response, the CISO implements a mandatory training course in which all employees are instructed
on the proper use of cloud-based storage. Which of the following risk strategies did the CISO
implement?
Which of the following explains this?
A security administrator is investigating the compromise of a software distribution website.
Forensic analysis shows that several popular files are infected with malicious code. However,
comparing a hash of the infected files with the original, non-infected files which were restored from
backup, shows that the hash is the same. Which of the following explains this?
Which of the following policies MUST be reviewed to address future compliance?
A court order has ruled that your company must surrender all the email sent and received by a
certain employee for the past five years. After reviewing the backup systems, the IT administrator
concludes that email backups are not kept that long. Which of the following policies MUST be
reviewed to address future compliance?
Which of the following security goals does this meet?
A system administrator needs to meet the maximum amount of security goals for a new DNS
infrastructure. The administrator deploys DNSSEC extensions to the domain names and
infrastructure. Which of the following security goals does this meet? (Select TWO).
Which of the following should the Information Technology department implement to reduce the security risk from
The risk manager is reviewing a report which identifies a requirement to keep a business critical
legacy system operational for the next two years. The legacy system is out of support because the
vendor and security patches are no longer released. Additionally, this is a proprietary embedded
system and little is documented and known about it. Which of the following should the Information
Technology department implement to reduce the security risk from a compromise of this system?
How should the employees request access to shared resources before the authentication integration is complete?
Two separate companies are in the process of integrating their authentication infrastructure into a
unified single sign-on system. Currently, both companies use an AD backend and two factor
authentication using TOTP. The system administrators have configured a trust relationship
between the authentication backend to ensure proper process flow. How should the employees
request access to shared resources before the authentication integration is complete?