Just 20 free qusetions
An organization intends to deploy an appliance capable of enhancing its telecommuting capabilities. The device must be adept at managing a large number of secure, authenticated connections, ensuring data integrity and confidentiality. Which network appliance should be implemented to meet these demands most efficiently?.
An organization has experienced a security incident involving an advanced persistent threat (APT) that has bypassed existing security controls and established a foothold on the network. As part of the incident response activities, what is the MOST appropriate immediate action to take once the threat is confirmed?
The first and most appropriate immediate action following the confirmation of an advanced persistent threat is to contain the threat. This is to prevent any further spread or damage within the network. Containment strategies may vary depending on the characteristics of the incident but often include isolating affected systems, blocking malicious traffic, or temporarily shutting down services. Eradication and recovery steps only follow after containment is successfully achieved, and while documentation is critical, it does not take precedence over containing an active threat. In this scenario, as we are dealing with an APT, fast action is crucial to limit the threat.
A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?
Which of the following physical security controls is designed to prevent unauthorized vehicles from entering a restricted area?
When deploying a new fleet of servers, what is the BEST initial step to ensure that they adhere to the company's security policy?
The risk register only needs to be updated when a new risk is identified, not as part of a regular review process.
A company is planning to integrate their authentication processes with a third-party service provider to allow employees to use a single set of credentials across both systems. To enhance the user experience and provide secure access to the services offered by the partner, which solution would be the BEST to implement?
The security team at XYZ Corporation is conducting a routine audit of the company's wireless technologies. They have identified the use of Bluetooth-enabled devices in several departments for sharing files and syncing personal devices with company laptops. Which of the following would be the MOST effective mitigation technique to reduce the risk of a potential security breach due to these Bluetooth connections?
Which of the following options is a network device that can use VLANs to reduce collisions and the size of broadcast domains?
A site fully equipped and operationally ready to take over functionality within minutes in the event of a system failure is classified as a warm site.
An organization is conducting a Business Impact Analysis. Which metric should be determined to establish the maximum time frame that a critical system can be disrupted before severe impact to business operations occurs?
Which of the following is the BEST method to protect credit card information in a database while still allowing for customer data analysis?
Unified Threat Management systems remain equally effective at threat mitigation even when their databases are not consistently updated with the latest threat intelligence.
When entering your company, you first enter a small area with a security desk where you must check-in with guard personnel before you are authorized access into the secure area. This area used for physical security is called what?
If an intruder smashes the back window of a house and gains entry, triggering an alarm due to motion detection, what category of security measure does the alarm system fall under?
During a scheduled change to implement a major software update, which of the following will BEST ensure that any unexpected issues can be remediated without affecting continued operations?
Implementing a gateway at the network perimeter is only effective for inbound traffic and cannot filter or control outbound traffic from the internal network to the internet.
Which of the following best describes an attack that is primarily motivated by disruption and chaos, rather than financial gain or data exfiltration?
During a review of system logs, a security analyst notices an increase in log entries off-hours for a service account. This account is associated with a third-party vendor's update process, which runs monthly maintenance. Which of the following actions should the analyst undertake FIRST to determine if these out-of-cycle log entries are of concern?
Last updated