Which of the following should be performed FIRST after the data breach occurred?
A data breach occurred which impacted the HR and payroll system. It is believed that an attack
from within the organization resulted in the data breach. Which of the following should be
performed FIRST after the data breach occurred?
Which of the following is the BEST way to preserve the non-volatile evidence?
A production server has been compromised. Which of the following is the BEST way to preserve
the non-volatile evidence?
Who should be contacted FIRST by the project team to discuss potential changes to the platform requirements?
A project has been established in a large bank to develop a new secure online banking platform.
Half way through the development it was discovered that a key piece of software used as part of
the base platform is now susceptible to recently published exploits. Who should be contacted
FIRST by the project team to discuss potential changes to the platform requirements?
During the development of the security solutions and policies, the FIRST thing the IT department should have d
The IT department of a large telecommunications company has developed and finalized a set of
security solutions and policies which have been approved by upper management for deployment
within the company. During the development of the security solutions and policies, the FIRST thing
the IT department should have done was:
Which of the following controls will BEST protect the corporate network?
Employees have recently requested remote access to corporate email and shared drives. Remote
access has never been offered; however, the need to improve productivity and rapidly responding
to customer demands means staff now requires remote access. Which of the following controls will
BEST protect the corporate network?
Which of the following BEST remediates the issue?
A manufacturing company is having issues with unauthorized access and modification of the
controls operating the production equipment. A communication requirement is to allow the free
flow of data between all network segments at the site. Which of the following BEST remediates the
issue?
Which of the following will provide the MOST protection from all likely attacks on the bank?
A small bank is introducing online banking to its customers through its new secured website. The
firewall has three interfaces: one for the Internet connection, another for the DMZ, and the other
for the internal network. Which of the following will provide the MOST protection from all likely
attacks on the bank?
Which of the following is an active security measure to protect against this threat?
The Chief Information Officer (CIO) comes to the security manager and asks what can be done to
reduce the potential of sensitive data being emailed out of the company. Which of the following is
an active security measure to protect against this threat?
Which of the following methods would BEST assist the developers in determining if any unknown vulnerabilities
A company is developing a new web application for its Internet users and is following a secure
coding methodology. Which of the following methods would BEST assist the developers in
determining if any unknown vulnerabilities are present?
Which of the following should the company conduct to meet the regulation’s criteria?
An organization must comply with a new regulation that requires the organization to determine if
an external attacker is able to gain access to its systems from outside the network. Which of the
following should the company conduct to meet the regulation’s criteria?