<< Prev Question Next Question >>

Question 153/183

An infrastructure team is at the end of a procurement process and has selected a vendor. As part of the final negotiations, there are a number of outstanding issues, including:
1. Indemnity clauses have identified the maximum liability
2. The data will be hosted and managed outside of the company's geographical location The number of users accessing the system will be small, and no sensitive data will be hosted in the solution. As the security consultant on the project, which of the following should the project's security consultant recommend as the NEXT step?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (183q)
Question 1: Which of the following is a feature of virtualization that c...
Question 2: A corporate forensic investigator has been asked to acquire ...
Question 3: After several industry comnpetitors suffered data loss as a ...
Question 4: Following the most recent patch deployment, a security engin...
Question 5: An organization is attempting to harden its web servers and ...
Question 6: The Chief Information Security Officer (CISO) suspects that ...
Question 7: A security researcher is gathering information about a recen...
Question 8: Staff members are reporting an unusual number of device thef...
Question 9: An engineer is reviewing the security architecture for an en...
Question 10: A company is purchasing an application that will be used to ...
Question 11: A red team is able to connect a laptop with penetration test...
Question 12: A software development company lost customers recently becau...
Question 13: During a criminal investigation, the prosecutor submitted th...
Question 14: Developers are working on anew feature to add to a social me...
Question 15: While conducting online research about a company to prepare ...
Question 16: While traveling to another state, the Chief Financial (CFO) ...
Question 17: A software development manager is running a project using ag...
Question 18: As part of an organization's compliance program, administrat...
Question 19: An organization is in the process of integrating its operati...
Question 20: Legal counsel has notified the information security manager ...
Question 21: A penetration tester is given an assignment lo gain physical...
Question 22: A server (10.0.0.2) on the corporate network is experiencing...
Question 23: When reviewing KRIs of the email security appliance with the...
Question 24: A security consultant was hired to audit a company's passwor...
Question 25: A software development team is conducting functional and use...
Question 26: A threat advisory alert was just emailed to the IT security ...
Question 27: An insurance company has two million customers and is resear...
Question 28: A company has completed the implementation of technical and ...
Question 29: Security policies that are in place at an organization prohi...
Question 30: First responders, who are part of a core incident response t...
Question 31: An international e-commerce company has identified attack tr...
Question 32: A recent penetration test identified that a web server has a...
Question 33: Which of the following risks does expanding business into a ...
Question 34: Confidential information related to Application A. Applicati...
Question 35: A regional business is expecting a severe winter storm next ...
Question 36: A security technician is incorporating the following require...
Question 37: After the departure of a developer under unpleasant circumst...
Question 38: An organization's mobile device inventory recently provided ...
Question 39: A security administrator is troubleshooting RADIUS authentic...
Question 40: After investigating virus outbreaks that have cost the compa...
Question 41: A Chief Information Officer (CIO) publicly announces the imp...
Question 42: During a routine network scan, a security administrator disc...
Question 43: A security engineer is assessing a new IoT product. The prod...
Question 44: A security architect has been assigned to a new digital tran...
Question 45: An external red team is brought into an organization to perf...
Question 46: Management is reviewing the results of a recent risk assessm...
Question 47: A security manager wants to implement a policy that will man...
Question 48: Given the following code snippet: (Exhibit) Which of the fol...
Question 49: An organization based in the United States is planning to ex...
Question 50: A network engineer is upgrading the network perimeter and in...
Question 51: A security engineer is working to secure an organization's V...
Question 52: A company is deploying a DIP solution and scanning workstati...
Question 53: While the code is still in the development environment, a se...
Question 54: A company is trying to resolve the following issues related ...
Question 55: A security architect is reviewing the code for a company's f...
Question 56: Several recent ransomware outbreaks at a company have cost a...
Question 57: An administrator wants to ensure hard drives cannot be remov...
Question 58: An engineer is evaluating the control profile to assign to a...
Question 59: A network printer needs Internet access to function. Corpora...
Question 60: Which of the following are the MOST likely vectors for the u...
Question 61: An organization is concerned that its hosted web servers are...
Question 62: The Chief Information Officer (CIO) has been asked to develo...
Question 63: An engineer wants to assess the OS security configurations o...
Question 64: A technician receives the following security alert from the ...
Question 65: An engineer needs to provide access to company resources for...
Question 66: An electric car company hires an IT consulting company to im...
Question 67: An organization is preparing to develop a business continuit...
Question 68: The Chief Information Security Officer (CISO) has asked the ...
Question 69: The board of a financial services company has requested that...
Question 70: A security engineer is assessing the controls that are in pl...
Question 71: Within change management, winch of the following ensures fun...
Question 72: Two competing companies experienced similar attacks on their...
Question 73: A hospital uses a legacy electronic medical record system th...
Question 74: Users have reported that an internally developed web applica...
Question 75: There have been several exploits to critical devices within ...
Question 76: A bank is initiating the process of acquiring another smalle...
Question 77: A DevOps team wants to move production data into the QA envi...
Question 78: A security administrator is updating a company's SCADA authe...
Question 79: A security engineer is making certain URLs from an internal ...
Question 80: Due to a recent acquisition, the security team must find a w...
Question 81: A penetration tester noticed special characters in a databas...
Question 82: A developer needs to provide feedback on a peer's work durin...
Question 83: An attacker exploited an unpatched vulnerability in a web fr...
Question 84: A company's Chief Operating Officer (COO) is concerned about...
Question 85: A security engineer is employed by a hospital that was recen...
Question 86: A software development team has spent the last 18 months dev...
Question 87: A security administrator is investigating an incident involv...
Question 88: Following a recent network intrusion, a company wants to det...
Question 89: The Chief Information Security Officer (CISO) of a company t...
Question 90: A managed service provider is designing a log aggregation se...
Question 91: A network engineer is attempting to design-in resiliency cha...
Question 92: A developer has executed code for a website that allows user...
Question 93: A company monitors the performance of all web servers using ...
Question 94: An enterprise is trying to secure a specific web-based appli...
Question 95: A security analyst is attempting to identify code that is vu...
Question 96: A security analyst works for a defense contractor that produ...
Question 97: A cybersecurity analyst is conducting packet analysis on the...
Question 98: A Chief Information Security Officer (CISO) needs to create ...
Question 99: A company is not familiar with the risks associated with IPv...
Question 100: A security consultant is improving the physical security of ...
Question 101: A company recently migrated to a SaaS-based email solution. ...
Question 102: A system administrator recently conducted a vulnerability sc...
Question 103: A SaaS-based email service provider often receives reports f...
Question 104: A large enterprise with thousands of users is experiencing a...
Question 105: The Chief Information Security Officer (CISO) is preparing a...
Question 106: Drag and drop the cloud deployment model to the associated u...
Question 107: During a sprint, developers are responsible for ensuring the...
Question 108: A company's user community is being adversely affected by va...
Question 109: An organization is engaged in international business operati...
Question 110: Ann, a retiring employee, cleaned out her desk. The next day...
Question 111: A software development firm wants to validate the use of sta...
Question 112: A forensics analyst suspects that a breach has occurred. Sec...
Question 113: Users have been reporting unusual automated phone calls, inc...
Question 114: A legacy web application, which is being used by a hospital,...
Question 115: Which of the following attacks can be mitigated by proper da...
Question 116: A security controls assessor intends to perform a holistic c...
Question 117: A hospital's security team recently determined its network w...
Question 118: A new corporate policy requires that all employees have acce...
Question 119: A user asks a security practitioner for recommendations on s...
Question 120: As part of the development process for a new system, the org...
Question 121: A security administrator was informed that a server unexpect...
Question 122: Ann, a security manager, is reviewing a threat feed that pro...
Question 123: A security administrator wants to implement an MDM solution ...
Question 124: A company is moving all of its web applications to an SSO co...
Question 125: An enterprise with global sites processes and exchanges high...
Question 126: The SOC is reviewing processes and procedures after a recent...
Question 127: Click on the exhibit buttons to view the four messages. (Exh...
Question 128: A penetration testing manager is contributing to an RFP for ...
Question 129: During a security event investigation, a junior analyst fail...
Question 130: A company has adopted and established a continuous-monitorin...
Question 131: A new security policy slates all wireless and wired authenti...
Question 132: A small firm's newly created website has several design flaw...
Question 133: A security analyst has been assigned incident response dutie...
Question 134: The legal department has required that all traffic to and fr...
Question 135: A penetration tester is trying to gain access to a remote sy...
Question 136: An organization is creating requirements for new laptops tha...
Question 137: (Exhibit)
Question 138: Given the code snippet below: (Exhibit) Which of the followi...
Question 139: A forensic analyst suspects that a buffer overflow exists in...
Question 140: An internal application has been developed to increase the e...
Question 141: An organization is reviewing endpoint security solutions. In...
Question 142: An organization implemented a secure boot on its most critic...
Question 143: A security engineer is designing a system in which offshore,...
Question 144: An organization is improving its web services to enable bett...
Question 145: A company has gone through a round of phishing attacks. More...
Question 146: A company that has been breached multiple times is looking t...
Question 147: A newly hired Chief Information Security Officer (CISO) is r...
Question 148: An organization is integrating an ICS and wants to ensure th...
Question 149: A firewall specialist has been newly assigned to participate...
Question 150: The SOC has noticed an unusual volume of traffic coming from...
Question 151: A security architect is determining the best solution for a ...
Question 152: A financial institution would like to store its customer dat...
Question 153: An infrastructure team is at the end of a procurement proces...
Question 154: Following a complete outage of the electronic medical record...
Question 155: A company is implementing a new secure identity application,...
Question 156: An application development company implements object reuse t...
Question 157: An organization is deploying IoT locks, sensors, and cameras...
Question 158: An employee decides to log into an authorized system. The sy...
Question 159: A product manager is concerned about the unintentional shari...
Question 160: A development team is testing an in-house-developed applicat...
Question 161: Given the following output from a security tool in Kali: (Ex...
Question 162: As part of the asset management life cycle, a company engage...
Question 163: A security administrator is concerned about the increasing n...
Question 164: A company has decided to lower costs by conducting an intern...
Question 165: The Chief Financial Officer (CFO) of a major hospital system...
Question 166: An information security officer reviews a report and notices...
Question 167: During the decommissioning phase of a hardware project, a se...
Question 168: Within the past six months, a company has experienced a seri...
Question 169: The risk subcommittee of a corporate board typically maintai...
Question 170: A security analyst has been asked to create a list of extern...
Question 171: A security administrator wants to allow external organizatio...
Question 172: A financial institution's information security officer is wo...
Question 173: A company's Chief Information Security Officer (CISO) is wor...
Question 174: An organization is currently working with a client to migrat...
Question 175: A newly hired security analyst has joined an established SOC...
Question 176: An organization is considering the use of a thin client arch...
Question 177: A security engineer wants to introduce key stretching techni...
Question 178: A company's security policy states any remote connections mu...
Question 179: A security engineer is attempting to increase the randomness...
Question 180: A security engineer successfully exploits an application dur...
Question 181: A network administrator is concerned about a particular serv...
Question 182: A laptop is recovered a few days after it was stolen. Which ...
Question 183: Joe an application security engineer is performing an audit ...