<< Prev Question Next Question >>

Question 94/133

A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization's security posture?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (133q)
Question 1: A financial institution would like to stare is customer data...
Question 2: A company is adopting a BYOD policy and is looking for a com...
Question 3: An organization has a growing workforce that is mostly drive...
Question 4: A global company is experiencing unauthorized logging due to...
Question 5: The cost of 'Cmovable media and the security risks of transp...
Question 6: A recently discovered zero-day exploit utilizes an unknown v...
Question 7: The process of passively gathering information prior to laun...
Question 8: A network administrator is concerned about users being expos...
Question 9: An analyst needs to set up a method for securely transferrin...
Question 10: The Chief Financial Officer (CFO) of an insurance company re...
Question 11: Which of the following provides the BEST protection for sens...
Question 12: Which of the following will MOST likely cause machine learni...
Question 13: A database administrator needs to ensure all passwords are s...
Question 14: The Chief Executive Officer (CEO) of an organization would l...
Question 15: An incident, which is affecting dozens of systems, involves ...
Question 16: Which of the following will provide the BEST physical securi...
Question 17: A security engineer is reviewing log files after a third dis...
Question 18: A small business office is setting up a wireless infrastruct...
Question 19: An attacker was easily able to log in to a company's securit...
Question 20: An organization regularly scans its infrastructure for missi...
Question 21: A vulnerability assessment report will include the CVSS scor...
Question 22: A Chief Security Officer (CSO) was notified that a customer ...
Question 23: An attacker is attempting to exploit users by creating a fak...
Question 24: A security analyst needs to complete an assessment. The anal...
Question 25: A company wants to deploy PKI on its Internet-facing website...
Question 26: Several large orders of merchandise were recently purchased ...
Question 27: A security engineer obtained the following output from a thr...
Question 28: During a security assessment, a security finds a file with o...
Question 29: An organization has been experiencing outages during holiday...
Question 30: Which of the following relets to applications and systems th...
Question 31: Which of the following utilize a subset of real data and are...
Question 32: A user enters a password to log in to a workstation and is t...
Question 33: An analyst has determined that a server was not patched and ...
Question 34: An organization's Chief Security Officer (CSO) wants to vali...
Question 35: A cybersecurity manager has scheduled biannual meetings with...
Question 36: An organization has hired a security analyst to perform a pe...
Question 37: Which of the following often operates in a client-server arc...
Question 38: Given the following logs: (Exhibit) Which of the following B...
Question 39: Accompany deployed a WiFi access point in a public area and ...
Question 40: An analyst needs to identify the applications a user was run...
Question 41: A security administrator is trying to determine whether a se...
Question 42: A security engineer at an offline government facility is con...
Question 43: An enterprise has hired an outside security firm to conduct ...
Question 44: A company recently experienced a data breach and the source ...
Question 45: A development team employs a practice of bringing all the co...
Question 46: A network administrator has been asked to install an IDS to ...
Question 47: A system administrator needs to implement an access control ...
Question 48: Which of the following is the BEST reason to maintain a func...
Question 49: A cybersecurity administrator has a reduced team and needs t...
Question 50: Which of the following would be BEST to establish between or...
Question 51: A security analyst needs to perform periodic vulnerability s...
Question 52: A500 is implementing an insider threat detection program, Th...
Question 53: A security analyst sees the following log output while revie...
Question 54: A researcher has been analyzing large data sets for the last...
Question 55: A remote user recently took a two-week vacation abroad and b...
Question 56: Which of the following scenarios would make a DNS sinkhole e...
Question 57: Following a prolonged datacenter outage that affected web-ba...
Question 58: An organization's help desk is flooded with phone calls from...
Question 59: Which of the following would be the BEST resource for a soft...
Question 60: Which of the following describes the BEST approach for deplo...
Question 61: A security analyst needs to generate a server certificate to...
Question 62: A security operations analyst is using the company's SIEM so...
Question 63: The lessons-learned analysis from a recent incident reveals ...
Question 64: A nuclear plant was the victim of a recent attack, and all t...
Question 65: A multinational organization that offers web-based services ...
Question 66: An organization is concerned that its hosted web servers are...
Question 67: A company is designing the layout of a new datacenter so it ...
Question 68: A technician needs to prevent data loss in a laboratory. The...
Question 69: A security analyst is investigating an incident to determine...
Question 70: A public relations team will be taking a group of guest on a...
Question 71: A remote user recently took a two-week vacation abroad and b...
Question 72: An engineer is setting up a VDI environment for a factory lo...
Question 73: A recent malware outbreak across a subnet included successfu...
Question 74: A security analyst is reviewing the following output from a ...
Question 75: A external forensics investigator has been hired to investig...
Question 76: A network administrator has been alerted that web pages are ...
Question 77: A security analyst receives a SIEM alert that someone logged...
Question 78: A privileged user at a company stole several proprietary doc...
Question 79: The new Chief Executive Officer (CEO) of a large company has...
Question 80: A security modern may have occurred on the desktop PC of an ...
Question 81: A retail executive recently accepted a job with a major comp...
Question 82: A security analyst is performing a forensic investigation co...
Question 83: An engineer wants to access sensitive data from a corporate-...
Question 84: A network engineer notices the VPN concentrator overloaded a...
Question 85: Which of the following would cause a Chief Information Secur...
Question 86: An.. that has a large number of mobile devices is exploring ...
Question 87: Which of the following are the MOST likely vectors for the u...
Question 88: n organization plans to transition the intrusion detection a...
Question 89: Which of the following algorithms has the SMALLEST key size?...
Question 90: A company is launching a new internet platform for its clien...
Question 91: A security analyst is configuring a large number of new comp...
Question 92: A cybersecurity administrator is using iptables as an enterp...
Question 93: A security administrator is analyzing the corporate wireless...
Question 94: A financial organization has adopted a new secure, encrypted...
Question 95: A security analyst is reviewing the following attack log out...
Question 96: A network administrator would like to configure a site-to-si...
Question 97: Which of the following are requirements that must be configu...
Question 98: To further secure a company's email system, an administrator...
Question 99: Which of the following organizational policies are MOST like...
Question 100: Which of the following is the correct order of volatility fr...
Question 101: A cybersecurity analyst reviews the log files from a web ser...
Question 102: An analyst is trying to identify insecure services that are ...
Question 103: A bank detects fraudulent activity on user's account. The us...
Question 104: While checking logs, a security engineer notices a number of...
Question 105: A Chief Security Officer (CSO) is concerned about the volume...
Question 106: A small company that does not have security staff wants to i...
Question 107: After reading a security bulletin, a network security manage...
Question 108: Which of the following BEST describes a security exploit for...
Question 109: Which of the following is a reason why an organization would...
Question 110: After consulting with the Chief Risk Officer (CRO). a manage...
Question 111: An organization has decided to host its web application and ...
Question 112: A security analyst is running a vulnerability scan to check ...
Question 113: The SOC is reviewing process and procedures after a recent i...
Question 114: An organization blocks user access to command-line interpret...
Question 115: A network technician is installing a guest wireless network ...
Question 116: An organization has implemented a two-step verification proc...
Question 117: A cybersecurity department purchased o new PAM solution. The...
Question 118: A security analyst discovers several .jpg photos from a cell...
Question 119: The CSIRT is reviewing the lessons learned from a recent inc...
Question 120: Which of the following will MOST likely adversely impact the...
Question 121: Phishing and spear-phishing attacks have been occurring more...
Question 122: Which of the following disaster recovery tests is The LEAST ...
Question 123: An auditor is performing an assessment of a security applian...
Question 124: An organization is having difficulty correlating events from...
Question 125: Which of the following BEST explains the difference between ...
Question 126: A security analyst receives the configuration of a current V...
Question 127: A user recent an SMS on a mobile phone that asked for bank d...
Question 128: A network engineer needs to create a plan for upgrading the ...
Question 129: An organization is developing a plan in the event of a compl...
Question 130: An incident response technician collected a mobile device du...
Question 131: Local guidelines require that all information systems meet a...
Question 132: During an incident response, a security analyst observes the...
Question 133: When used at the design stage, which of the following improv...