Which of the following is MOST likely to protect the SCADA systems from misuse?
During a recent investigation, an auditor discovered that an engineer’s compromised
workstation was being used to connect to SCADA systems while the engineer was not
logged in. The engineer is responsible for administering the SCADA systems and cannot be
blocked from connecting to them. The SCADA systems cannot be modified without vendor
approval which requires months of testing. Which of the following is MOST likely to protect
the SCADA systems from misuse?
Which of the following should the administrator implement?
A security administrator must implement a network authentication solution which will ensure
encryption of user credentials when users enter their username and password to
authenticate to the network. Which of the following should the administrator implement?
Which of the following would be the BEST control to implement?
Several employees have been printing files that include personally identifiable information of
customers. Auditors have raised concerns about the destruction of these hard copies after
they are created, and management has decided the best way to address this concern is by
preventing these files from being printed. Which of the following would be the BEST control
to implement?
Which of the following controls is preventing them from completing their work?
The company’s sales team plans to work late to provide the Chief Executive Officer (CEO)
with a special report of sales before the quarter ends. After working for several hours, the
team finds they cannot save or print the reports. Which of the following controls is preventing
them from completing their work?
Which of the following provide the BEST protection against brute forcing stored passwords?
A security engineer is asked by the company’s development team to recommend the most
secure method for password storage. Which of the following provide the BEST protection
against brute forcing stored passwords? (Select TWO).
After entering the following information into a SOHO wireless router, a mobile device’s user reports being u
After entering the following information into a SOHO wireless router, a mobile device’s user
reports being unable to connect to the network:
PERMIT 0A: D1: F
Which of the following would be MOST effective for preventing this behavior?
The call center supervisor has reported that many employees have been playing preinstalled
games on company computers and this is reducing productivity. Which of the following
would be MOST effective for preventing this behavior?
which of the following ciphers would a user need to specify the key strength?
When creating a public / private key pair, for which of the following ciphers would a user
need to specify the key strength?
Which of the following types of interoperability agreement is this?
A company has decided to move large data sets to a cloud provider in order to limit the costs
of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants
to make sure both parties have a clear understanding of the controls needed to protect the
data. Which of the following types of interoperability agreement is this?
Which of the following solutions provides the most flexibility when testing new security controls prior to imp
Which of the following solutions provides the most flexibility when testing new security
controls prior to implementation?