Which of the following methods should the company consider to secure this data in the future?
Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles of a
particular vendor. Which of the following methods should the company consider to secure this data in the
future?
Which of the following controls can be used to prevent the disclosure of…?
Which of the following controls can be used to prevent the disclosure of sensitive information stored on a
mobile device’s removable media in the event that the device is lost or stolen?
Which of the following database designs provides the BEST security for the online store?
An online store wants to protect user credentials and credit card information so that customers can store
their credit card information and use their card for multiple separate transactions.Which of the following database designs provides the BEST security for the online store?
Which of the following would provide the strongest protection?
A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?
Which of the following is the BEST solution to mitigate unintentional exposure of confidential information?
Several departments within a company have a business need to send high volumes of confidential
information to customers via email. Which of the following is the BEST solution to mitigate unintentional
exposure of confidential information?
Which of the following controls support this goal?
After recovering from a data breach in which customer data was lost, the legal team meets with the Chief
Security Officer (CSO) to discuss ways to better protect the privacy of customer data.
Which of the following controls support this goal?
Which of the following is occurring?
A security audit identifies a number of large email messages being sent by a specific user from their
company email account to another address external to the company. These messages were sent prior to
a company data breach, which prompted the security audit. The user was one of a few people who had
access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user
at various locations during a recent vacation. No suspicious activities from other users who have access to
the data were discovered.
Which of the following is occurring?
Which of the following describes how the employee is leaking these secrets?
A security analyst has been notified that trade secrets are being leaked from one of the executives in the
corporation. When reviewing this executive’s laptop they notice several pictures of the employee’s pets
are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard
drive against the hashes on the cloud network they do not match.
Which of the following describes how the employee is leaking these secrets?
which cannot be reversed and converts data into a string of characters?
Which of the following functions provides an output which cannot be reversed and converts data into a
string of characters?
This technique is known as:
A software developer wants to prevent stored passwords from being easily decrypted. When the
password is stored by the application, additional text is added to each password before the password is
hashed. This technique is known as: