Q: 1
To save on device life-cycle costs, a company is transitioning to a BYOD deployment scheme for
enterprise mobility. Local laws protect users from corporate-initiated wiping or manipulation of data
not owned by the company. Which of the following techniques would best protect corporate data
while ensuring the integrity of private data?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
A security administrator at a global organization wants to update password complexity rules for a
system containing personally identifiable information. Which of the following would be the best
resource for this information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
An internal security audit determines that Telnet is currently being used within the environment to
manage network switches. Which of the following tools should be utilized to identify credentials in
plaintext that are used to log in to these devices?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
After investigating a recent security incident, a SOC analyst is charged with creating a reference guide
for the entire team to use. Which of the following should the analyst create to address future
incidents?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
A mobile device hardware manufacturer receives the following requirements from a company that wants to produce and sell a new mobile platform:
•The platform should store biometric data.
•The platform should prevent unapproved firmware from being loaded.
• A tamper-resistant, hardware-based counter should track if unapproved firmware was loaded.
Which of the following should the hardware manufacturer implement? (Select three).
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A security architect discovers the following page while testing a website for vulnerabilities:
404 - page not found: /gy67162
The page you have requested is no. avai.able on .his server.
Apache Tomcat 7.0.52
Which of the following best describes why this issue should be corrected?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
A compliance officer is responsible for selecting the right governance framework to protect
individuals' dat
a. Which of the following is the appropriate framework for the company to consult when collecting
international user data for the purpose of processing credit cards?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A company's BIA indicates that any loss of more than one hour of data would be catastrophic to the
business. Which of the following must be in place to meet this requirement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
A company has been the target of LDAP injections, as well as brute-force, whaling, and spear-
phishing attacks. The company is concerned about ensuring continued system access. The company
has already implemented a SSO system with strong passwords. Which of the following additional
controls should the company deploy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A company wants to reduce its backup storage requirement and is undertaking a data cleanup
project. Which of the following should a security administrator consider first when determining
which data should be deleted?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2