View Mode
Q: 1
Which risk management strategy will help prevent cheating using a learning management system as a platform?
Options
Q: 2
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data. Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?
Options
Q: 3
A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device. Which solution meets the requirements in this scenario?
Options
Q: 4
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?
Options
Q: 5
An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches. What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?
Options
Q: 6
A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks. Which framework identifies the seven phases of an attack, from initial infiltration to post- exploitation?
Options
Q: 7
A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories. Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?
Options
Q: 8
What is a component of IT infrastructure?
Options
Q: 9
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability. Which risk mitigation strategy will meet the needs of the company?
Options
Q: 10
What is the vocabulary and set of rules for instructing a computer to perform certain tasks?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE