Which of the following is occurring?
The Chief Security Officer (CSO) is contacted by a first responder. The CSO assigns a handler.
Which of the following is occurring?
Which of the following controls can further secure the data in the central storage system?
An organization must implement controls to protect the confidentiality of its most sensitive data.
The company is currently using a central storage system and group based access control for its
sensitive information. Which of the following controls can further secure the data in the central
storage system?
Which of the following policies should be enforced to initiate a password change?
A network administrator, Joe, arrives at his new job to find that none of the users have changed
their network passwords since they were initially hired. Joe wants to have everyone change their
passwords immediately. Which of the following policies should be enforced to initiate a password
change?
Which of the following would BEST alleviate her concerns?
Ann, a security administrator at a call center, has been experiencing problems with users
intentionally installing unapproved and occasionally malicious software on their computers. Due to
the nature of their jobs, Ann cannot change their permissions. Which of the following would BEST
alleviate her concerns?
Which of the following should be used to authenticate and log connections from wireless users connecting with
Which of the following should be used to authenticate and log connections from wireless users
connecting with EAP-TLS?
Which of the following describes this type of data?
A security administrator is auditing a database server to ensure the correct security measures are
in place to protect the data. Some of the fields consist of people’s first name, last name, home
address, date of birth and mothers last name. Which of the following describes this type of data?
Which of the following would be MOST appropriate if an organization’s requirements mandate complete cont
Which of the following would be MOST appropriate if an organization’s requirements mandate
complete control over the data and applications stored in the cloud?
Which of the following does he need to estimate NEXT in order to complete his risk calculations?
Joe, the information security manager, is tasked with calculating risk and selecting controls to
protect a new system. He has identified people, environmental conditions, and events that could
affect the new system. Which of the following does he need to estimate NEXT in order to complete
his risk calculations?
which of the following is the BEST action for the manager to take?
The data security manager is notified that a client will be sending encrypted information on optical
discs for import into the company database. Once imported, the information is backed up and the
discs are no longer needed. Following the import, which of the following is the BEST action for the
manager to take?
Which of the following is the MOST likely reason for the incident?
A network administrator identifies sensitive files being transferred from a workstation in the LAN to
an unauthorized outside IP address in a foreign country. An investigation determines that the
firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following
is the MOST likely reason for the incident?