Which of the following is the typical culprit in this type of threat?
Corruption/modification is one of the biggest threats to an operations environment. Which of the following is the typical culprit in this type of threat?
Which of the following should not be put into place to reduce these concerns?
Bob is a new security administrator at a financial institution. The organization has experienced some suspicious activity on one of the critical servers that contain customer data. When reviewing how the systems are administered, he uncovers some concerning issues pertaining to remote administration. Which of the following should not be put into place to reduce these concerns?
i. Commands and data should not take place in cleartext
ii. SSH should be used, not Telnet.
iii. Truly critical systems should be administered locally instead of remotely.
iv. Only a small number of administrators should be able to carry out remote functionality.
v. Strong authentication should be in place for any administration activities.
which of the following?
As a general statement, employees who are transferring internally should go through which of the following?
What should Karen do with this report?
Karen is responsible for processing and printing reports for the senior management team and all security administrators. Today, she notices that one report contains no data. What should Karen do with this report?
The preservation of a secure state in the event of failure is referred to as ___________.
The preservation of a secure state in the event of failure is referred to as ___________.
A company that wishes to maximize data writing efficiency should _______.
A company that wishes to maximize data writing efficiency should _______.
Which of the following is the first item that Sam should have developed and implanted?
Sam is a new manager at a retail store. He has been informed that the company has had a continual problem of users installing unapproved software. Which of the following is the first item that Sam should have developed and implanted?
which would be considered the best method for preventing privileged user misuse?
In the aftermath of computer crime, it is discovered that the act was carried out by an employee with privileged access. Of the following, which would be considered the best method for preventing privileged user misuse?
which is true?
Jonathan works in a highly secure environment where user and data classification is closely monitored. There are very few privileged users who can access all devices at a privileged level. When dealing with this type of access level, which is true?
What type of control is the business continuity procedure?
As part of the overall disaster recovery plan, the team writes business continuity procedures that work to return operations to normal conditions. What type of control is the business continuity procedure?