<< Prev Question Next Question >>

Question 8/133

An online bank has contracted with a consultant to perform a security assessment of the bank's web portal. The consultant notices the login page is linked from the main page with HTTPS, but when the URL is changed to HTTP, the browser is automatically redirected back to the HTTPS site. Which of the following is a concern for the consultant, and how can it be mitigated?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (133q)
Question 1: A government organization operates and maintains several ICS...
Question 2: A manufacturing company recently recovered from an attack on...
Question 3: A security assessor is working with an organization to revie...
Question 4: A pharmacy gives its clients online access to their records ...
Question 5: The security configuration management policy states that all...
Question 6: The Chief Information Security Officer (CISO) of an establis...
Question 7: The Chief Information Officer (CIO) wants to increase securi...
Question 8: An online bank has contracted with a consultant to perform a...
Question 9: An engineer maintains a corporate-owned mobility infrastruct...
Question 10: An SQL database is no longer accessible online due to a rece...
Question 11: A security appliance vendor is reviewing an RFP that is requ...
Question 12: A network printer needs Internet access to function. Corpora...
Question 13: A Chief Information Security Officer (CISO) is reviewing the...
Question 14: A cybersecurity analyst is conducting packet analysis on the...
Question 15: Management is reviewing the results of a recent risk assessm...
Question 16: A financial institution's information security officer is wo...
Question 17: A technician receives the following security alert from the ...
Question 18: Following a recent and very large corporate merger, the numb...
Question 19: A technician receives the following security alert from the ...
Question 20: An organization is currently performing a market scan for ma...
Question 21: An analyst has noticed unusual activities in the SIEM to a ....
Question 22: A new cluster of virtual servers has been set up in a lab en...
Question 23: As a result of an acquisition, a new development team is bei...
Question 24: An external red team member conducts a penetration test, att...
Question 25: A project manager is working with a software development gro...
Question 26: A security engineer is assisting a developer with input vali...
Question 27: Following a security assessment, the Chief Information Secur...
Question 28: A Chief Information Security Officer (CISO) is developing a ...
Question 29: Legal authorities notify a company that its network has been...
Question 30: A company is developing requirements for a customized OS bui...
Question 31: A software development manager is running a project using ag...
Question 32: A managed service provider is designing a log aggregation se...
Question 33: A company has created a policy to allow employees to use the...
Question 34: A security analyst is reviewing the following packet capture...
Question 35: After analyzing code, two developers al a company bring thes...
Question 36: A threat advisory alert was just emailed to the IT security ...
Question 37: A security analyst is reviewing the corporate MDM settings a...
Question 38: The Chief Financial Officer (CFO) of a major hospital system...
Question 39: Drag and drop the cloud deployment model to the associated u...
Question 40: An organization is implementing a virtualized thin-client so...
Question 41: An infrastructure team within an energy organization is at t...
Question 42: A newly hired Chief Information Security Officer (CISO) is r...
Question 43: Which of the following is an external pressure that causes c...
Question 44: A technician is reviewing the following log: (Exhibit) Which...
Question 45: A company's chief cybersecurity architect wants to configure...
Question 46: A Chief Information Security Officer (CISO) is creating a se...
Question 47: After a large organization has completed the acquisition of ...
Question 48: An infrastructure team is at the end of a procurement proces...
Question 49: While attending a meeting with the human resources departmen...
Question 50: A security administrator is updating a company's SCADA authe...
Question 51: The Chief Executive Officer (CEO) of a fast-growing company ...
Question 52: Given the following code snippet: (Exhibit) Which of the fol...
Question 53: A hospital is using a functional magnetic resonance imaging ...
Question 54: A security consultant is improving the physical security of ...
Question 55: A large enterprise with thousands of users is experiencing a...
Question 56: A company has decided to replace all the T-1 uplinks at each...
Question 57: A legacy web application, which is being used by a hospital,...
Question 58: A security engineer is assessing the controls that are in pl...
Question 59: The finance department has started to use a new payment syst...
Question 60: Following a merger, the number of remote sites for a company...
Question 61: A penetration tester is conducting an assessment on Comptia....
Question 62: A web developer has implemented HTML5 optimizations into a l...
Question 63: An internal penetration tester was assessing a recruiting pa...
Question 64: An organization, which handles large volumes of PII, allows ...
Question 65: An organization is improving its web services to enable bett...
Question 66: An enterprise's Chief Technology Officer (CTO) and Chief Inf...
Question 67: A product manager is concerned about the unintentional shari...
Question 68: A developer emails the following output to a security admini...
Question 69: A company is the victim of a phishing and spear-phishing cam...
Question 70: As part of the asset management life cycle, a company engage...
Question 71: A financial consulting firm recently recovered from some dam...
Question 72: A cybersecurity analyst has received an alert that well-know...
Question 73: A security analyst is troubleshooting a scenario in which an...
Question 74: A security incident responder discovers an attacker has gain...
Question 75: Given the following information about a company's internal n...
Question 76: An engineer is reviewing the security architecture for an en...
Question 77: A software development team has spent the last 18 months dev...
Question 78: When reviewing KRIs of the email security appliance with the...
Question 79: An organization's network engineering team recently deployed...
Question 80: A vulnerability was recently announced that allows a malicio...
Question 81: The marketing department has developed a new marketing campa...
Question 82: A Chief Information Security Officer (CISO) implemented MFA ...
Question 83: The legal department has required that all traffic to and fr...
Question 84: Due to a recent breach, the Chief Executive Officer (CEO) ha...
Question 85: A security engineer is investigating a compromise that occur...
Question 86: A security engineer is performing an assessment again for a ...
Question 87: An information security manager conducted a gap analysis, wh...
Question 88: A laptop is recovered a few days after it was stolen. Which ...
Question 89: One of the objectives of a bank is to instill a security awa...
Question 90: An organization's Chief Financial Officer (CFO) was the targ...
Question 91: A core router was manipulated by a credentialed bypass to se...
Question 92: A security manager recently categorized an information syste...
Question 93: At a meeting, the systems administrator states the security ...
Question 94: An analyst is investigating behavior on a corporate-owned, c...
Question 95: An incident responder wants to capture volatile memory compr...
Question 96: A Chief Information Security Officer (CISO) of a large finan...
Question 97: A security engineer must establish a method to assess compli...
Question 98: An enterprise is trying to secure a specific web-based appli...
Question 99: Which of the following is the GREATEST security concern with...
Question 100: A security architect is implementing security measures in re...
Question 101: After an employee was terminated, the company discovered the...
Question 102: An administrator is working with management to develop polic...
Question 103: Legal counsel has notified the information security manager ...
Question 104: A manufacturing company employs SCADA systems to drive assem...
Question 105: A security architect has been assigned to a new digital tran...
Question 106: A pharmacy gives its clients online access to their records ...
Question 107: Following a recent outage a systems administrator is conduct...
Question 108: A security architect is reviewing the code for a company's f...
Question 109: A security administrator must configure the database server ...
Question 110: In the past, the risk committee at Company A has shown an av...
Question 111: A database administrator is required to adhere to and implem...
Question 112: A security engineer is working with a software development t...
Question 113: A company has hired an external security consultant to condu...
Question 114: Developers are working on anew feature to add to a social me...
Question 115: Which of the following system would be at the GREATEST risk ...
Question 116: A regional business is expecting a severe winter storm next ...
Question 117: A security administrator wants to implement controls to hard...
Question 118: A corporate forensic investigator has been asked to acquire ...
Question 119: A security engineer is designing a system in which offshore,...
Question 120: A company's Chief Operating Officer (COO) is concerned about...
Question 121: A forensic analyst suspects that a buffer overflow exists in...
Question 122: A systems administrator has installed a disk wiping utility ...
Question 123: A team is at the beginning stages of designing a new enterpr...
Question 124: During a recent incident, sensitive data was disclosed and s...
Question 125: An organization wants to arm its cybersecurity defensive sui...
Question 126: A technician is validating compliance with organizational po...
Question 127: A security engineer is working to secure an organization's V...
Question 128: During a routine network scan, a security administrator disc...
Question 129: An external red team is brought into an organization to perf...
Question 130: Click on the exhibit buttons to view the four messages. (Exh...
Question 131: An organization has established the following controls matri...
Question 132: An organization just merged with an organization in another ...
Question 133: A security engineer is attempting to increase the randomness...