<< Prev Question Next Question >>

Question 78/93

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization's security posture?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (93q)
Question 1: A recently discovered zero-day exploit utilizes an unknown v...
Question 2: An attacker is exploiting a vulnerability that does not have...
Question 3: Which of the following ISO standards is certified for privac...
Question 4: A company wants to deploy PKI on its Internet-facing website...
Question 5: Which of the following relets to applications and systems th...
Question 6: The IT department at a university is concerned about profess...
Question 7: A security analyst needs to make a recommendation for restri...
Question 8: After entering a username and password, and administrator mu...
Question 9: A Chief Information Security Officer (CISO) needs to create ...
Question 10: The SOC is reviewing process and procedures after a recent i...
Question 11: A security analyst is reviewing the output of a web server l...
Question 12: Which of the following describes the BEST approach for deplo...
Question 13: Which of the following job roles would sponsor data quality ...
Question 14: An analyst visits an internet forum looking for information ...
Question 15: A remote user recently took atwo-week vacation abroad and br...
Question 16: Which of the following algorithms has the SMALLEST key size?...
Question 17: Which of the following incident response steps involvesactio...
Question 18: The Chief Financial Officer (CFO) of an insurance company re...
Question 19: Which of the following would be BEST to establish between or...
Question 20: An organization suffered an outage and a critical system too...
Question 21: A security analyst discovers that a company username and pas...
Question 22: A security analyst has received an alert about being sent vi...
Question 23: Following a prolonged datacenter outage that affected web-ba...
Question 24: A startup company is using multiple SaaS and IaaS platforms ...
Question 25: A security analyst is performing a forensic investigation co...
Question 26: A security administrator needs to create a RAIS configuratio...
Question 27: Which of the following types of controls is a turnstile?...
Question 28: A network administrator needs to build out a new datacenter,...
Question 29: A user is concerned that a web application will not be able ...
Question 30: An organization's help desk is flooded with phone calls from...
Question 31: A company has drafted an insider-threat policy that prohibit...
Question 32: Which of the following will MOST likelycause machine learnin...
Question 33: A company is upgrading its wireless infrastructure to WPA2-E...
Question 34: A network administrator would like to configure a site-to-si...
Question 35: A vulnerability assessment report will include the CVSS scor...
Question 36: A security analyst is reviewing information regarding recent...
Question 37: Select the appropriate attack andremediation from each drop-...
Question 38: A network administrator has been asked to install an IDS to ...
Question 39: A manufacturer creates designs for very high security produc...
Question 40: To reduce costs and overhead, an organization wants to move ...
Question 41: A cybersecurity administrator is usingiptables as an enterpr...
Question 42: A network engineer is troubleshooting wireless network conne...
Question 43: A symmetric encryption algorithm Is BEST suited for:...
Question 44: Which of the following are the MOST likely vectors for the u...
Question 45: A malicious actor recently penetration a company's network a...
Question 46: The Chief Executive Officer (CEO) of an organization would l...
Question 47: An analyst has determined that a server was not patched and ...
Question 48: In which ofthe following situations would it be BEST to use ...
Question 49: A security analyst needs to be proactive in understand the t...
Question 50: A large enterprise has moved all Hs data to the cloud behind...
Question 51: Which of the following BEST describes a security exploit for...
Question 52: Anorganization has hired a security analyst to perform a pen...
Question 53: When selecting a technical solution for identity management,...
Question 54: A security analyst has been asked to investigate a situation...
Question 55: An employee has been charged with fraud and is suspected of ...
Question 56: Company engineers regularly participate in a public Internet...
Question 57: A security analyst is investigating an incident to determine...
Question 58: A network engineer needs tocreate a plan for upgrading the w...
Question 59: A user reports constant lag and performance issues with the ...
Question 60: In which of the following risk management strategies would c...
Question 61: A security modern may have occurred on the desktop PC of an ...
Question 62: Several employees return to work the day after attending an ...
Question 63: An organization that is located in a flood zone is MOST like...
Question 64: To secure an application after a large data breach, an e-com...
Question 65: An organization hired a consultant to assist with an active ...
Question 66: A development team employs a practice of bringing all the co...
Question 67: A security analyst is reviewing a new website that will soon...
Question 68: A small business justrecovered from a ransomware attack agai...
Question 69: Joe, a user at a company, clicked an email link led to a web...
2 commentQuestion 70: A security engineer needs to enhance MFA access to sensitive...
Question 71: A consultant is configuring a vulnerability scanner for a la...
Question 72: An enterprise has hired an outside security firm to conductp...
Question 73: Anorganization routes all of its traffic through a VPN Most ...
Question 74: A security analyst sees the following logoutput while review...
Question 75: A commercial cyber-threat intelligence organization observes...
Question 76: A public relations team will be taking a group of guest on a...
Question 77: A smart switch has the ability to monitor electrical levels ...
Question 78: A financial organization has adopted a new secure, encrypted...
Question 79: A network administrator is setting up wireless access points...
Question 80: The IT department's on-site developer has beenwith the team ...
Question 81: A company's Chief Information Security Officer (CISO) recent...
Question 82: A document that appears to be malicious has been discovered ...
Question 83: An attacked is attempting to exploit users by creating a fak...
Question 84: A RAT that was used to compromise an organization's banking ...
Question 85: A root cause analysis reveals that a web application outage ...
Question 86: In which of the following common use cases would steganograp...
Question 87: A company needs to centralize its logs to create a baseline ...
Question 88: A Chief Security Officer (CSO) is concerned about theamount ...
Question 89: An organization has a growing workforce that is mostly drive...
Question 90: An organization's RPO for a critical system is two hours. Th...
Question 91: An incident response technician collected a mobile device du...
Question 92: An analyst needs to set up a method for securely transferrin...
Question 93: In the middle of a cybersecurity, a security engineer remove...