<< Prev Question Next Question >>

Question 91/92

The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:
* Users to choose a password unique to their last ten passwords
* Users to not log in from certain high-risk countries
Which of the following should the security team implement? (Select TWO).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (92q)
Question 1: A security analyst was called to investigate a file received...
1 commentQuestion 2: A news article states hackers have been selling access to Io...
Question 3: A company needs to validate its updated incident response pl...
Question 4: A security analyst was asked to evaluate a potential attack ...
Question 5: Which of the following control types is focused primarily on...
Question 6: Which of the following provides a calculated value for known...
Question 7: A network administrator has been alerted that web pages are ...
Question 8: Which of the following is the GREATEST security concern when...
1 commentQuestion 9: After gaining access to a dual-homed (i.e.. wired and wirele...
Question 10: A company is moving its retail website to a public cloud pro...
Question 11: Which of the following describes a social engineering techni...
Question 12: Which of the following is used to ensure that evidence is ad...
1 commentQuestion 13: A new company wants to avoid channel interference when build...
Question 14: Which of the following would detect intrusions at the perime...
Question 15: While preparing a software Inventory report, a security anal...
1 commentQuestion 16: An organization has hired a ted team to simulate attacks on ...
Question 17: A social media company based in North Amenca is looking to e...
Question 18: An organization just implemented a new security system. Loca...
Question 19: A company is under investigation for possible fraud. As part...
1 commentQuestion 20: A security analyst has identified malv/are spreading through...
Question 21: A customer service representative reported an unusual text m...
Question 22: An organization is migrating several SaaS applications that ...
Question 23: Which of the following risk management strategies would an o...
Question 24: Which of the following is a policy that provides a greater d...
Question 25: Which of the following components can be used to consolidate...
Question 26: While investigating a recent security incident, a security a...
1 commentQuestion 27: Security analysts are conducting an investigation of an atta...
Question 28: An attacker was eavesdropping on a user who was shopping onl...
Question 29: A network engineer created two subnets that will be used for...
1 commentQuestion 30: An organization has developed an application that needs a pa...
Question 31: An organization would like to give remote workers the abilit...
Question 32: An application developer accidentally uploaded a company's c...
Question 33: Which of the following concepts BEST describes tracking and ...
Question 34: Which of the following controls is used to make an organizat...
Question 35: A security analyst has identified malware spreading through ...
Question 36: A major political party experienced a server breach. The hac...
Question 37: Which of the following is the BEST action to foster a consis...
Question 38: Which of the following is a benefit of including a risk mana...
Question 39: Which of the following would be the BEST way to analyze disk...
Question 40: A company recently added a DR site and is redesigning the ne...
1 commentQuestion 41: A Chief Information Security Officer wants to ensure the org...
Question 42: A security engineer was assigned to implement a solution to ...
1 commentQuestion 43: A security policy states that common words should not be use...
1 commentQuestion 44: Which of the following will increase cryptographic security?...
Question 45: A company recently experienced an inside attack using a corp...
1 commentQuestion 46: An attacker has determined the best way to impact operations...
Question 47: During a recent security assessment, a vulnerability was fou...
Question 48: A security analyst receives an alert from trie company's SIE...
Question 49: Which of the following describes the continuous delivery sof...
Question 50: Which of the following is assured when a user signs an email...
Question 51: A routine audit of medical billing claims revealed that seve...
Question 52: A security engineer is deploying a new wireless for a compan...
Question 53: Which of the following is a risk that is specifically associ...
Question 54: An ofgantzation has decided to purchase an insurance policy ...
1 commentQuestion 55: A security engineer is building a file transfer solution to ...
Question 56: A database administrator wants to grant access to an applica...
Question 57: After a recent security breach, a security analyst reports t...
Question 58: A recent phishing campaign resulted in several compromised u...
1 commentQuestion 59: The Chief Compliance Officer from a bank has approved a back...
Question 60: A company wants to build a new website to sell products onli...
Question 61: The president of a regional bank likes to frequently provide...
1 commentQuestion 62: A user wanted to catch up on some work over the weekend but ...
Question 63: Which of the following organizations sets frameworks and con...
Question 64: Certain users are reporting their accounts are being used to...
Question 65: A company is implementing BYOD and wants to ensure all users...
Question 66: An amusement park is implementing a btomelnc system that val...
Question 67: The Chief Information Security Officer (CISO) of a bank rece...
Question 68: A security analyst needs to be able to search and correlate ...
1 commentQuestion 69: Data exftitration analysis indicates that an attacker manage...
Question 70: A security analyst is receiving several alerts per user and ...
Question 71: A vulnerability has been discovered and a known patch to add...
Question 72: A company is implementing a DLP solution on the file server....
Question 73: An organization is planning lo open other data centers to su...
Question 74: A security forensics analyst is examining a virtual server. ...
Question 75: A systems administrator reports degraded performance on a vi...
Question 76: Which of the following should an organization consider imple...
Question 77: A report delivered to the Chief Information Security Officer...
1 commentQuestion 78: A Chief Security Officer is looking for a solution that can ...
Question 79: The Chief information Security Officer wants to prevent exfi...
Question 80: During a recent security incident at a multinational corpora...
Question 81: Which of the following should be monitored by threat intelli...
1 commentQuestion 82: A security architect is required to deploy to conference roo...
Question 83: A junior security analyst iss conducting an analysis after p...
Question 84: An organization wants to participate in threat intelligence ...
Question 85: A Chief Security Officer is looking for a solution that can ...
Question 86: Field workers in an organization are issued mobile phones on...
Question 87: To reduce and limit software and infrastructure costs, the C...
Question 88: An organization is building backup server rooms in geographi...
Question 89: Several attempts have been made lo pick the door lock of a s...
Question 90: A company is providing security awareness training regarding...
Question 91: The new Chief Information Security Officer at a company has ...
Question 92: A security analyst is evaluating the risks of authorizing mu...