Which of the following is a way to implement a technical control to mitigate data loss in case of a mobile dev
Which of the following is a way to implement a technical control to mitigate data loss in case of a
mobile device theft?
The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-si
The BEST methods for a web developer to prevent the website application code from being
vulnerable to cross-site request forgery (XSRF) is to: (Select TWO).
Which of the following is the MOST likely reason for the unusual results?
When an order was submitted via the corporate website, an administrator noted special characters
(e.g., β;–β and βor 1=1 –β) were input instead of the expected letters and numbers. Which of the
following is the MOST likely reason for the unusual results?
(Select TWO).
When a communications plan is developed for disaster recovery and business continuity plans,
the MOST relevant items to include would bE. (Select TWO).
which of the following tasks?
Key elements of a business impact analysis should include which of the following tasks?
End-user awareness training for handling sensitive personally identifiable information would include secure st
End-user awareness training for handling sensitive personally identifiable information would
include secure storage and transmission of customer:
Which of the following authentication methods should Jane use?
Jane, a security administrator, needs to implement a secure wireless authentication method that
uses a remote RADIUS server for authentication. Which of the following authentication methods
should Jane use?
Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least privile
Which of the following risk mitigation strategies will allow Ann, a security analyst, to enforce least
privilege principles?
which of the following points in an incident should the officer instruct employees to use this information?
The security officer is preparing a read-only USB stick with a document of important personal
phone numbers, vendor contacts, an MD5 program, and other tools to provide to employees. At
which of the following points in an incident should the officer instruct employees to use this
information?
which of the following steps should be preformed FIRST?
To ensure proper evidence collection, which of the following steps should be preformed FIRST?