Which of the following controls should be implemented t…
The help desk is receiving numerous password change alerts from users in the accounting department. These alerts occur multiple times on the same day for each
of the affected users’ accounts. Which of the following controls should be implemented to curtail this activity?
Which of the following delineates why it is important t…
Which of the following delineates why it is important to perform egress filtering and monitoring on Internet connected security zones of interfaces on a firewall?
When designing a web based client server application wi…
When designing a web based client server application with single application server and database cluster backend, input validation should be performed:
Which of the following techniques can be bypass a user …
Which of the following techniques can be bypass a user or computer’s web browser privacy settings? (Select Two)
Which of the following is the MOST critical for immedia…
A datacenter manager has been asked to prioritize critical system recovery priorities. Which of the following is the MOST critical for immediate recovery?
Which of the following methods should the security admi…
A security administrator needs an external vendor to correct an urgent issue with an organization’s physical access control system (PACS). The PACS does not
currently have internet access because it is running a legacy operation system. Which of the following methods should the security administrator select the best
balances security and efficiency?
which of the following?
A company is investigating a data compromise where data exfiltration occurred. Prior to the investigation, the supervisor terminates an employee as a result of the
suspected data loss. During the investigation, the supervisor is absent for the interview, and little evidence can be provided from the role-based authentication
system in use by the company. The situation can be identified for future mitigation as which of the following?
Which of the following BEST describes the current softw…
Six months into development, the core team assigned to implement a new internal piece of software must convene to discuss a new requirement with the
stakeholders. A stakeholder identified a missing feature critical to the organization, which must be implemented. The team needs to validate the feasibility of the
newly introduced requirement and ensure it does not introduce new vulnerabilities to the software and other applications that will integrate with it. Which of the
following BEST describes the current software development phase?
Which of the following model prevents the IDS from capt…
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSLinspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from
capturing credentials used to authenticate users to the new service or keys to decrypt that communication?
Which of the following can be used to control specific …
Which of the following can be used to control specific commands that can be executed on a network infrastructure device?