<< Prev Question Next Question >>

Question 92/164

Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (164q)
Question 1: An analyst is trying to identify insecure services that are ...
Question 2: A cybersecurity administrator has a reduced team and needs t...
Question 3: A Chief Information Officer receives an email stating a data...
Question 4: An organization is concerned that is hosted web servers are ...
Question 5: A financial institution would like to stare is customer data...
Question 6: A security assessment determines DES and 3DES at still being...
Question 7: The website http://companywebsite.com requires users to prov...
1 commentQuestion 8: The security administrator has installed a new firewall whic...
Question 9: A security analyst must determine if either SSH or Telnet is...
Question 10: A company is setting up a web server on the Internet that wi...
Question 11: A security administrator needs to inspect in-transit files o...
Question 12: A smart switch has the ability to monitor electrical levels ...
Question 13: While reviewing pcap data, a network security analyst is abl...
Question 14: A malicious actor recently penetration a company's network a...
Question 15: Company engineers regularly participate in a public Internet...
Question 16: A privileged user at a company stole several proprietary doc...
Question 17: Accompany deployed a WiFi access point in a public area and ...
Question 18: A cybersecurity administrator is using iptables as an enterp...
Question 19: A company just implemented a new telework policy that allows...
Question 20: A security analyst needs to perform periodic vulnerably scan...
Question 21: Which of the following are requirements that must be configu...
Question 22: The security team received a report of copyright infringemen...
Question 23: The IT department at a university is concerned about profess...
Question 24: A Chief Security Officer (CSO) was notified that a customer ...
Question 25: A company is upgrading its wireless infrastructure to WPA2-E...
Question 26: A cybersecurity manager has scheduled biannual meetings with...
Question 27: Select the appropriate attack and remediation from each drop...
Question 28: A Chief Security Officer (CSO) is concerned about the amount...
Question 29: A user downloaded an extension for a browser, and the uses d...
Question 30: A security administrator is analyzing the corporate wireless...
Question 31: A symmetric encryption algorithm Is BEST suited for:...
Question 32: Which of the following should a technician consider when sel...
Question 33: Which of the following would be BEST to establish between or...
Question 34: A security manager for a retailer needs to reduce the scope ...
Question 35: A security analyst is reviewing the output of a web server l...
Question 36: A small business office is setting up a wireless infrastruct...
Question 37: The new Chief Executive Officer (CEO) of a large company has...
Question 38: A website developer is working on a new e-commerce website a...
Question 39: A company recently experienced a data breach and the source ...
Question 40: A company is implementing a new SIEM to log and send alerts ...
Question 41: To further secure a company's email system, an administrator...
Question 42: A Chief Security Officer (CSO) is concerned about the volume...
Question 43: A major political party experienced a server breach. The hac...
Question 44: A network administrator has been asked to design a solution ...
Question 45: A client sent several inquiries to a project manager about t...
Question 46: A user recently attended an exposition and received some dig...
Question 47: Which of the following will MOST likely cause machine learni...
Question 48: A financial analyst has been accused of violating the compan...
Question 49: An organization has expanded its operations by opening a rem...
Question 50: The spread of misinformation surrounding the outbreak of a n...
Question 51: An auditor is performing an assessment of a security applian...
Question 52: A customer called a company's security team to report that a...
Question 53: A network manager is concerned that business may be negative...
Question 54: A security analyst is investigation an incident that was fir...
Question 55: An analyst visits an internet forum looking for information ...
Question 56: A network technician is installing a guest wireless network ...
Question 57: Which of the following is MOST likely to outline the roles a...
Question 58: A security analyst needs to produce a document that details ...
Question 59: If a current private key is compromised, which of the follow...
Question 60: A cloud administrator is configuring five compute instances ...
Question 61: A remote user recently took a two-week vacation abroad and b...
Question 62: Joe. a security analyst, recently performed a network discov...
Question 63: Which of the following distributes data among nodes, making ...
Question 64: An information security officer at a credit card transaction...
Question 65: A network administrator would like to configure a site-to-si...
Question 66: A network administrator is concerned about users being expos...
Question 67: A company recently moved sensitive videos between on-premise...
Question 68: A pharmaceutical sales representative logs on to a laptop an...
Question 69: A company was recently breached Part of the company's new cy...
Question 70: A Chief Executive Officer's (CEO) personal information was s...
Question 71: A small business just recovered from a ransomware attack aga...
Question 72: An.. that has a large number of mobile devices is exploring ...
Question 73: Which of the following types of attacks is specific to the i...
Question 74: When selecting a technical solution for identity management,...
Question 75: A smart retail business has a local store and a newly establ...
Question 76: A security analyst is configuring a large number of new comp...
Question 77: A company's help desk received several AV alerts indicating ...
Question 78: A development team employs a practice of bringing all the co...
Question 79: Which of the following incident response steps involves acti...
Question 80: When implementing automation with loT devices, which of the ...
Question 81: A newly purchased corporate WAP needs to be configured in th...
Question 82: A security analyst receives a SIEM alert that someone logged...
Question 83: A company processes highly sensitive data and senior managem...
Question 84: A company has drafted an insider-threat policy that prohibit...
Question 85: Which of the following would a European company interested i...
Question 86: A document that appears to be malicious has been discovered ...
Question 87: A nuclear plant was the victim of a recent attack, and all t...
Question 88: The SIEM at an organization has detected suspicious traffic ...
Question 89: A company wants to modify its current backup strategy to min...
Question 90: A security analyst was deploying a new website and found a c...
Question 91: A systems administrator needs to install a new wireless netw...
Question 92: Which of the following would BEST identify and remediate a d...
Question 93: A security administrator needs to create a RAIS configuratio...
Question 94: A technician needs to prevent data loss in a laboratory. The...
Question 95: A company has been experiencing very brief power outages fro...
Question 96: The concept of connecting a user account across the systems ...
Question 97: Which of the following would be the BEST resource lor a soft...
Question 98: A security analyst reviews the datacenter access logs for a ...
Question 99: Which of the following is a team of people dedicated testing...
Question 100: A company has limited storage available and online presence ...
Question 101: After entering a username and password, and administrator mu...
Question 102: A Chief Information Security Officer (CISO) is concerned abo...
Question 103: Several employees return to work the day after attending an ...
Question 104: A security assessment found that several embedded systems ar...
Question 105: Which of the following terms should be included in a contrac...
Question 106: A company's Chief Information Security Officer (CISO) recent...
Question 107: During an incident response, a security analyst observes the...
Question 108: Which of the following would be the BEST method for creating...
Question 109: Which of the following will provide the BEST physical securi...
Question 110: A network administrator at a large organization Is reviewing...
Question 111: Joe, a user at a company, clicked an email link led to a web...
Question 112: Ann, a forensic analyst, needs to prove that the data she or...
Question 113: An attacker was easily able to log in to a company's securit...
Question 114: A Chief Security Office's (CSO's) key priorities are to impr...
Question 115: An attack relies on an end user visiting a website the end u...
Question 116: A consultant is configuring a vulnerability scanner for a la...
Question 117: A developer is building a new portal to deliver single-pane-...
Question 118: Which of the following job roles would sponsor data quality ...
Question 119: The process of passively gathering information prior to laun...
Question 120: Which of the following is a risk that is specifically associ...
Question 121: Remote workers in an organization use company-provided lapto...
Question 122: An organization has hired a security analyst to perform a pe...
Question 123: An organization is developing an authentication service for ...
Question 124: A company provides mobile devices to its users to permit acc...
Question 125: A recent security assessment revealed that an actor exploite...
Question 126: An organization has a growing workforce that is mostly drive...
Question 127: Which of the following provides the BEST protection for sens...
Question 128: A security modern may have occurred on the desktop PC of an ...
Question 129: A company uses specially configured workstations tor any wor...
Question 130: A security auditor is reviewing vulnerability scan data prov...
Question 131: A financial organization has adopted a new secure, encrypted...
Question 132: The Chief Financial Officer (CFO) of an insurance company re...
Question 133: A security administrator currently spends a large amount of ...
Question 134: Which of the following would cause a Chief Information Secur...
Question 135: An organization's finance department is implementing a polic...
Question 136: A network engineer notices the VPN concentrator overloaded a...
Question 137: A systems administrator needs to install the same X.509 cert...
Question 138: A security administrator suspects there may be unnecessary s...
Question 139: A security engineer needs to enhance MFA access to sensitive...
Question 140: A public relations team will be taking a group of guest on a...
Question 141: A security analyst wants to verify that a client-server (non...
Question 142: A university is opening a facility in a location where there...
Question 143: To secure an application after a large data breach, an e-com...
Question 144: An organization's RPO for a critical system is two hours. Th...
Question 145: A local coffee shop runs a small WiFi hot-spot for its custo...
Question 146: Which of the following allows for functional test data to be...
Question 147: A SECURITY ANALYST NEEDS TO FIND REAL-TIME DATA ON THE LATES...
Question 148: Which of the following controls would BEST identify and repo...
Question 149: While investigating a data leakage incident, a security anal...
Question 150: A company uses wireless tor all laptops and keeps a very det...
Question 151: A user must introduce a password and a USB key to authentica...
Question 152: An organization's corporate offices were destroyed due to a ...
Question 153: Which of the following technical controls is BEST suited for...
Question 154: After a ransomware attack a forensics company needs to revie...
Question 155: During a security assessment, a security finds a file with o...
Question 156: The Chief Information Security Officer wants to pilot a new ...
Question 157: Which of the following often operates in a client-server arc...
Question 158: Which of the following environments minimizes end-user disru...
Question 159: Which of the following job roles would sponsor data quality ...
Question 160: A cybersecurity administrator needs to add disk redundancy f...
Question 161: Which of the following types of controls is a CCTV camera th...
Question 162: A root cause analysis reveals that a web application outage ...
Question 163: A security analyst is reviewing information regarding recent...
Question 164: In which of the following risk management strategies would c...