<< Prev Question Next Question >>

Question 43/203

An organization discovers that unauthorized applications have been installed on company- provided mobile phones. The organization issues these devices,
but some users have managed to bypass the security controls. Which of the following is the MOST likely issue, and how can the organization BEST prevent this from happening?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (203q)
Question 1: A security analyst reports a company policy violation in a c...
Question 2: A mae Clotting company recently lost 4 aege amount of propee...
Question 3: A security analyst is reviewing the following output from a ...
Question 4: A startup company is using multiple SaaS and IaaS platform t...
Question 5: An IT security manager requests a report on company informat...
Question 6: Multiple beaconing activities to a malicious domain have bee...
Question 7: The spread of misinformation surrounding the outbreak of a n...
Question 8: A security analyst is reviewing the vulnerability scan repor...
Question 9: An analyst visits an internet forum looking for information ...
Question 10: A network administrator needs to determine Ihe sequence of a...
Question 11: A security analyst needs to find real-time data on the lates...
Question 12: Due to unexpected circumstances, an IT company must vacate i...
Question 13: Which of the following would cause a Chief Information Secur...
Question 14: A security analyst Is reviewing the following output from a ...
Question 15: After a hardware incident, an unplanned emergency maintenanc...
Question 16: Which of the following incident response phases should the p...
Question 17: The board of doctors at a company contracted with an insuran...
Question 18: A security analyst must enforce policies to harden an MDM in...
Question 19: The Chief Information Security Officer (CISO) has requested ...
Question 20: A database administrator wants to grant access to an applica...
Question 21: The security administrator has installed a new firewall whic...
Question 22: An organization is developing a plan in the event of a compl...
Question 23: Which of the following describes a maintenance metric that m...
Question 24: A security analyst Is investigating multiple hosts that are ...
Question 25: Which of the following will MOST likely adversely impact the...
Question 26: An attacker browses a company's online job board attempting ...
Question 27: Phishing and spear-phishing attacks have been occurring more...
Question 28: Which of the following is a detective and deterrent control ...
Question 29: Whiich of the following Gieuster recovery tests ie the LEAST...
Question 30: A security analyst is logged into a Windows file server and ...
Question 31: nteping a secure area requires passing though two doors, bot...
Question 32: A global pandemic is forcing a private organization to close...
Question 33: Which of the following is a difference between a DRP and a B...
Question 34: Which of the following should be monitored by threat intelli...
Question 35: If a current private key is compromised, which of the follow...
Question 36: A manufacturer creates designs for very high security produc...
Question 37: The Chief Information Security Officer (CISO) has decided to...
Question 38: A Chief Information Officer is concerned about employees usi...
Question 39: A security analyst reviews a company's authentication logs a...
Question 40: A security engineer at an offline government facility is con...
Question 41: A financial institution would like to store its customer dat...
Question 42: A company uses specially configured workstations tor any wor...
Question 43: An organization discovers that unauthorized applications hav...
Question 44: A company wants to restrict emailing of PHI documents. The c...
Question 45: Which of the fofowing should an organization conskier implem...
Question 46: An enterprise has hired an outside security firm to conduct ...
Question 47: A developer is building a new portal to deliver single-pane-...
Question 48: Which of the following refers to applications and systems th...
Question 49: A security analyst is reviewing a new website that will soon...
Question 50: A company's Chief Information Security Officer (CISO) recent...
Question 51: A company's security team received notice of a critical vuln...
Question 52: Which of the following BEST describes a social-engineering a...
Question 53: A network administrator has been alerted that web pages are ...
Question 54: A security analyst notices several attacks are being blocked...
Question 55: A security researcher has aferted an organuzation that its s...
Question 56: A company discovered that terabytes of data have been exfilt...
Question 57: Joe, a security analyst, recently performed a network discov...
Question 58: Drag and Drop Question A security engineer is setting up pas...
Question 59: A security analyst is preparing a threat for an upcoming int...
Question 60: Which of the following policies would help an organization i...
Question 61: A company was compromised, and a security analyst discovered...
Question 62: An attacker has successfully exfiltrated several non-salted ...
Question 63: An organization's help desk is flooded with phone calls from...
Question 64: A company is implementing MFA for all applications that stor...
Question 65: A security engineer needs to enhance MFA access to sensitive...
Question 66: A company has drafted an insider-threat policy that prohibit...
Question 67: A newly purchased corporate WAP needs to be configured in th...
Question 68: A security analyst is Investigating a malware incident at a ...
Question 69: Security analyst must enforce policies to harden an MOM infr...
Question 70: A Chief information Officer is concemed about employees usin...
Question 71: A junior security analyst is conducting an analysis after pa...
Question 72: An application owner reports suspicious activity on an inter...
Question 73: An organization maintains several environments in which patc...
Question 74: A systems analyst is responsible for generating a new digita...
Question 75: An attacker is trying to gain access by installing malware o...
Question 76: A security engineer obtained the following output from a thr...
Question 77: An organization wants to enable built-in FDE on all laptops ...
Question 78: A security analyst needs to determine how an attacker was ab...
Question 79: To mitigate the impact of a single VM being compromised by a...
Question 80: A Chief Information Security Officer (CISO) is concerned abo...
Question 81: A security analyst is reviewing the following attack log out...
Question 82: A network administrator has been asked to install an IDS to ...
Question 83: A security engineer is installing a WAF to protect the compa...
Question 84: During an incident response, a security analyst observes the...
Question 85: Which of the following is the BEST reason to maintain a func...
Question 86: As part of a company's ongoing SOC maturation process, the c...
Question 87: A security administrator needs to create a RAID configuratio...
Question 88: A security analyst is investigating an incident to determine...
Question 89: A security analyst needs to be proactive in understanding th...
Question 90: Leveraging the information supplied below, complete the CSR ...
Question 91: A security engineer needs to build a solution to satisfy reg...
Question 92: A company recently added a DR site and is redesigning the ne...
Question 93: The IT department at a university is concerned about profess...
Question 94: Which of the following would a European company interested i...
Question 95: Under GDPR, which of the following is MOST responsible for t...
Question 96: A vulnerability assessment report will include the CVSS scor...
Question 97: A penetration tester successfully gained access to a company...
Question 98: An application owner reports suspicious activity on an inter...
Question 99: During an incident response, a security analyst observes the...
Question 100: A security analyst is responding to an alert from the SIEM. ...
Question 101: Due to unexpected circumstances, an IT company must vacate i...
Question 102: A network engineer and a security engineer are discussing wa...
Question 103: A company has determined that if its computer-based manufact...
Question 104: A security analyst was called to investigate a file received...
Question 105: Which of the following allows for functional test data to be...
Question 106: Which of the following uses six initial steps that provide b...
Question 107: A security analyst is reviewing the following attack log out...
Question 108: A Chief Executive Officer (CEO) is dissatisfied with the lev...
Question 109: The lessons-learned analysis from a recent incident reveals ...
Question 110: During a forensic investigation, a security analyst discover...
Question 111: A Chief information Officer is concerned about employees usi...
Question 112: The following are the logs of a successful attack. (Exhibit)...
Question 113: During a routine scan of a wireless segment at a retail comp...
Question 114: A security analyst is Investigating a malware incident at a ...
Question 115: A company recently added a DR site and is redesigning the ne...
Question 116: During a recent penetration test, the tester discovers large...
Question 117: A security engineer is setting up passwordless authenticatio...
Question 118: Which of the following types of attacks is being attempted a...
Question 119: Drag and Drop Question Leveraging the information supplied b...
Question 120: An analyst is generating a security report for the managemen...
Question 121: A public relations team will be taking a group of guest on a...
Question 122: A security architect is required to deploy to conference roo...
Question 123: A security analyst receives a SIEM alert that someone logged...
Question 124: Which of the following describes the BEST approach for deplo...
Question 125: Which of the following BEST describes the method a security ...
Question 126: Which of the following measures the average time that equipm...
Question 127: The Chief Information Security Officer warns lo prevent exfi...
Question 128: A company is providing security awareness training regarding...
Question 129: The Chief Information Security Officer wants to pilot a new ...
Question 130: A security analyst is tasked with defining the "something yo...
Question 131: An organization implemented a process that compares the sett...
Question 132: A Chief Security Officer (CSO) is concerned about the volume...
Question 133: Joe, an employee, receives an email stating he won the lotte...
Question 134: Which of the following will MOST likely cause machine learni...
Question 135: An analyst visits an Internet forum looking for information ...
Question 136: An organization would like to give remote workers the abilit...
Question 137: Developers are writing code and merging it into shared repos...
Question 138: A security analyst is reviewing the output of a web server l...
Question 139: A network administrator has been asked to install an IDS to ...
Question 140: Historically. a company has had issues with users plugging i...
Question 141: A security analyst is running a vulnerability scan to check ...
Question 142: A company a "right to forgotten" request To legally comply, ...
Question 143: A Chief Executive Officer (CEO) is dissatisfied with the lev...
Question 144: A security analyst is performing a forensic investigation co...
Question 145: Select the appropriate attack and remediation from each drop...
Question 146: A help desk technician receives a phone call from someone cl...
Question 147: Select the appropriate attack and remediation from each drop...
Question 148: Which of the following is the MOST secure but LEAST expensiv...
Question 149: Which of the following is the MOST relevant security check t...
Question 150: When planning to build a virtual environment, an administrat...
Question 151: A business is looking for a cloud service provider that offe...
Question 152: A technician enables full disk encryption on a laptop that w...
Question 153: An organization has implemented a two-step verification proc...
Question 154: A security analyst is receiving numerous alerts reporting th...
Question 155: A company processes highly sensitive data and senior managem...
Question 156: An organization recently acquired an ISO 27001 certification...
Question 157: A security engineer obtained the following output from a thr...
Question 158: Select the appropriate attack and remediation from each drop...
Question 159: An engineer needs to deploy a security measure to identify a...
Question 160: Which of the following should a technician consider when sel...
Question 161: Which of the following would satisfy three-factor authentica...
Question 162: The Chief Information Secunty Officer (CISO) requested a rep...
Question 163: An analyst is reviewing logs associated with an attack. The ...
Question 164: Which of the following control types is focused primarily on...
Question 165: A security forensics analyst is examining a virtual server. ...
Question 166: An enterprise has hired an outside security firm to conduct ...
Question 167: Which of the following types of controls is a turnstile?...
Question 168: Which of the following will provide the BEST physical securi...
Question 169: An attacker has determined the best way to impact operations...
Question 170: An organization blocks user access to command-line interpret...
Question 171: Several universities are participating m a collaborative res...
Question 172: A company recently upgraded its authentication infrastructur...
Question 173: Select the appropriate attack and remediation from each drop...
Question 174: Which of the following describes the exploitation of an inte...
Question 175: As part of a security compliance assessment, an auditor perf...
Question 176: A small business just recovered from a ransomware attack aga...
Question 177: The SOC for a large MSSP is meeting to discuss the lessons l...
Question 178: A security engineer is setting up passwordless authenticatio...
Question 179: Which of the following organizations sets frameworks and con...
Question 180: Select the appropriate attack and remediation from each drop...
Question 181: A network engineer needs to create a plan for upgrading the ...
Question 182: In which of the following risk management strategies would c...
Question 183: Which of the following is the MOST effective control against...
Question 184: A new security engineer has started hardening systems. One o...
Question 185: Which of the following is the MOST likely motivation for a s...
Question 186: A security engineer is setting up passwordless authenticatio...
Question 187: While checking logs, a security engineer notices a number of...
Question 188: A forensic analyst needs to prove that data has not been tam...
Question 189: The new Chief Executive Officer (CEO) of a large company has...
Question 190: In the middle of a cyberattack, a security engineer removes ...
Question 191: A company recently added a DR site and is redesigning the ne...
Question 192: The security administrator has installed a new firewall whic...
Question 193: A user attempts to load a web-based application, but the exp...
Question 194: A user wanted to catch up on some work over the weekend but ...
Question 195: A security analyst is investigating a report from a penetrat...
Question 196: The Chief Information Security Officer (CISO) has requested ...
Question 197: An organization has activated an incident response plan due ...
Question 198: The concept of connecting a user account across the systems ...
Question 199: Which of the following biometric authentication methods is t...
Question 200: A university is opening a facility in a location where there...
Question 201: A security administrator is trying to determine whether a se...
Question 202: A company would like to set up a secure way to transfer data...
Question 203: A client sent several inquiries to a project manager about t...