Q: 11
A company is concerned about the potential risks associated with unauthorized modifications to the
Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement
hardening techniques and endpoint security controls to mitigate the risk.
Which technique will prevent unauthorized modifications to the BIOS firmware on a server?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities,
including outdated software and weak password policies. The company also needs to implement a
new core banking system that can handle a large number of transactions while ensuring the security
of customer data.
Which risk mitigation process is the most effective approach to address these vulnerabilities, and
what is the best topology for the new core banking system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
HOTSPOT Match the legislative purpose with the corresponding legislation. Answer options may be used more than once or not at all.
Your Answer
Discussion
If the question said "federal agencies only" instead of all organizations, would DMCA still apply or would that go to another law?
Be respectful. No spam.
Q: 14
A company has recently experienced a data breach in which customer information was stolen. The
company is concerned about the potential for future data breaches. A review of the incident
revealed that the breach originated from stolen credentials.
Which security measure will meet the needs of this company?
Options
Discussion
A imo, since MFA would stop attackers even if credentials get stolen.
Be respectful. No spam.
Q: 15
Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to
cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?
Options
Discussion
A is just a mode, not a cipher. Before picking, are we supposed to focus on what's commonly used in TLS or just general stream ciphers?
Be respectful. No spam.
Q: 16
An IT organization recently implemented a hybrid cloud deployment. The security team must be able
to correlate event data combined from different sources in a central location.
What is the best solution?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which encryption technique can be used to enable a third-party provider to perform calculations on
encrypted data without decrypting the data?
Options
Discussion
A
Be respectful. No spam.
Q: 18
In which generation were computers first built with transistors?
Options
Discussion
Pretty sure it's B since the first gen was vacuum tubes, not transistors. Second gen is when those small, more efficient transistors started getting used. Anyone think C could make sense here?
B
Be respectful. No spam.
Q: 19
An IT organization has recently implemented a hybrid cloud deployment. The server team is
deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must
be able to use their Active Directory credentials to sign in to applications regardless of whether they
are running on Windows servers in the cloud or on-premises.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2
