<< Prev Question Next Question >>

Question 9/161

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile.
Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (161q)
Question 1: During a security incident, the security operations team ide...
Question 2: Which of the following should be used to aggregate log data ...
Question 3: Company A jointly develops a product with Company B, which i...
Question 4: The marketing department set up its own project management s...
Question 5: A security analyst is reviewing the following logs: (Exhibit...
Question 6: A company is planning a disaster recovery site and needs to ...
Question 7: An organization needs to monitor its users' activities to pr...
Question 8: A new employee logs in to the email system for the first tim...
Question 9: During the onboarding process, an employee needs to create a...
Question 10: Which of the following is the best way to consistently deter...
Question 11: While investigating a recent security breach an analyst find...
Question 12: After an audit, an administrator discovers all users have ac...
Question 13: The management team notices that new accounts that are set u...
Question 14: While considering the organization's cloud-adoption strategy...
Question 15: A network manager wants to protect the company's VPN by impl...
Question 16: Various company stakeholders meet to discuss roles and respo...
Question 17: A security analyst and the management team are reviewing the...
Question 18: A systems administrator is looking for a low-cost applicatio...
Question 19: Which of the following automation use cases would best enhan...
Question 20: A cyber operations team informs a security analyst about a n...
Question 21: The local administrator account for a company's VPN applianc...
Question 22: Which of the following is a type of vulnerability that invol...
Question 23: A hacker gained access to a system via a phishing attempt th...
Question 24: Which of the following is the best reason to complete an aud...
Question 25: Which of the following is the most likely to be included as ...
Question 26: A company's legal department drafted sensitive documents in ...
Question 27: Which of the following actions could a security engineer tak...
Question 28: Which of the following would a security administrator use to...
Question 29: Which of the following scenarios describes a possible busine...
Question 30: An employee receives a text message that appears to have bee...
Question 31: An administrator has identified and fingerprinted specific f...
Question 32: A systems administrator notices that one of the systems crit...
Question 33: After a security awareness training session, a user called t...
Question 34: A security engineer at a large company needs to enhance IAM ...
Question 35: Which of the following would be the most appropriate way to ...
Question 36: An IT manager informs the entire help desk staff that only t...
Question 37: Which of the following is a possible consequence of a VM esc...
Question 38: An administrator assists the legal and compliance team with ...
Question 39: Which of the following is a common source of unintentional c...
Question 40: The security operations center is researching an event conce...
Question 41: Which of the following methods to secure credit card data is...
Question 42: Which of the following is an example of a data protection st...
Question 43: A security analyst is reviewing alerts in the SIEM related t...
Question 44: A financial institution would like to store its customer dat...
Question 45: Which of the following are the best security controls for co...
Question 46: Which of the following is the best way to validate the integ...
Question 47: A company wants to improve the availability of its applicati...
Question 48: Which of the following is the final step of the modem respon...
Question 49: A security practitioner completes a vulnerability assessment...
Question 50: Which of the following can best protect against an employee ...
Question 51: A security audit of an organization revealed that most of th...
Question 52: Employees in the research and development business unit rece...
Question 53: A security analyst is investigating an application server an...
Question 54: A company purchased cyber insurance to address items listed ...
Question 55: Which of the following vulnerabilities is associated with in...
Question 56: A company is currently utilizing usernames and passwords, an...
Question 57: A security team created a document that details the order in...
Question 58: Which of the following has been implemented when a host-base...
Question 59: A security analyst finds a rogue device during a monthly aud...
Question 60: A new vulnerability enables a type of malware that allows th...
Question 61: A Chief Information Security Officer wants to monitor the co...
Question 62: A security analyst needs to propose a remediation plan 'or e...
Question 63: A company hired a consultant to perform an offensive securit...
Question 64: A security administrator would like to protect data on emplo...
Question 65: Which of the following would be best suited for constantly c...
Question 66: A bank set up a new server that contains customers' Pll. Whi...
Question 67: Which of the following describes the procedures a penetratio...
Question 68: A security analyst receives an alert from a corporate endpoi...
Question 69: Malware spread across a company's network after an employee ...
Question 70: A technician is opening ports on a firewall for a new system...
Question 71: Which of the following would be the best way to handle a cri...
Question 72: An organization is struggling with scaling issues on its VPN...
Question 73: A company is required to use certified hardware when buildin...
Question 74: A company recently decided to allow employees to work remote...
Question 75: Which of the following environments utilizes a subset of cus...
Question 76: Which of the following is used to protect a computer from vi...
Question 77: A company is aware of a given security risk related to a spe...
Question 78: An IT security team is concerned about the confidentiality o...
Question 79: Which of the following tools can assist with detecting an em...
Question 80: During an investigation, an incident response team attempts ...
Question 81: A spoofed identity was detected for a digital certificate. W...
Question 82: Which of the following best describes the concept of informa...
Question 83: A technician needs to apply a high-priority patch to a produ...
Question 84: Which of the following is best used to detect fraud by assig...
Question 85: A security analyst reviews domain activity logs and notices ...
Question 86: Which of the following is the best way to prevent an unautho...
Question 87: Which of the following best practices gives administrators a...
Question 88: An organization recently updated its security policy to incl...
Question 89: Which of the following would be the best way to test resilie...
Question 90: Which of the following allows for the attribution of message...
Question 91: A security team is setting up a new environment for hosting ...
Question 92: A systems administrator is auditing all company servers to e...
Question 93: A user would like to install software and features that are ...
Question 94: Which of the following describes the process of concealing c...
Question 95: Which of the following is used to validate a certificate whe...
Question 96: Which of the following phases of an incident response involv...
Question 97: Which of the following is the first step to take when creati...
Question 98: Which of the following should an organization focus on the m...
Question 99: Which of the following considerations is the most important ...
Question 100: The security operations center is researching an event conce...
Question 101: An attacker posing as the Chief Executive Officer calls an e...
Question 102: An important patch for a critical application has just been ...
Question 103: Which of the following is used to add extra complexity befor...
Question 104: An organization plans to expand its operations international...
Question 105: Which of the following would best explain why a security ana...
Question 106: A security administrator recently reset local passwords and ...
Question 107: An administrator is reviewing a single server's security log...
Question 108: An administrator must replace an expired SSL certificate. Wh...
Question 109: Which of the following security control types does an accept...
Question 110: Which of the following describes a security alerting and mon...
Question 111: Which of the following explains why an attacker cannot easil...
Question 112: A systems administrator set up a perimeter firewall but cont...
Question 113: Which of the following threat actors would most likely defac...
Question 114: Which of the following allows a systems administrator to tun...
Question 115: An organization is developing a security program that convey...
Question 116: Which of the following best describe a penetration test that...
Question 117: Which of the following most accurately describes the order i...
Question 118: Which of the following are cases in which an engineer should...
Question 119: A company is expanding its threat surface program and allowi...
Question 120: Various stakeholders are meeting to discuss their hypothetic...
Question 121: Which of the following is a primary security concern for a c...
Question 122: Which of the following agreement types defines the time fram...
Question 123: After a recent vulnerability scan, a security engineer needs...
Question 124: A group of developers has a shared backup account to access ...
Question 125: A company must ensure sensitive data at rest is rendered unr...
Question 126: Which of the following best describe why a process would req...
Question 127: Which of the following alert types is the most likely to be ...
Question 128: Which of the following would be most useful in determining w...
Question 129: A company is developing a critical system for the government...
Question 130: Which of the following vulnerabilities is exploited when an ...
Question 131: Users at a company are reporting they are unable to access t...
Question 132: A company wants to verify that the software the company is d...
Question 133: Which of the following would be the best ways to ensure only...
Question 134: An IT manager is putting together a documented plan describi...
Question 135: An organization implemented cloud-managed IP cameras to moni...
Question 136: Which of the following must be considered when designing a h...
Question 137: A security administrator needs a method to secure data in an...
Question 138: Which of the following examples would be best mitigated by i...
Question 139: Which of the following is the best way to provide secure rem...
Question 140: Visitors to a secured facility are required to check in with...
Question 141: Which of the following would best explain why a security ana...
Question 142: Which of the following would be the best way to block unknow...
Question 143: Which of the following should be used to ensure a device is ...
Question 144: A client demands at least 99.99% uptime from a service provi...
Question 145: An IT manager is increasing the security capabilities of an ...
Question 146: A company is changing its mobile device policy. The company ...
Question 147: An organization recently started hosting a new service that ...
Question 148: Which of the following can be used to identify potential att...
Question 149: An enterprise is trying to limit outbound DNS traffic origin...
Question 150: An engineer needs to find a solution that creates an added l...
Question 151: A company prevented direct access from the database administ...
Question 152: While troubleshooting a firewall configuration, a technician...
Question 153: Which of the following threat vectors is most commonly utili...
Question 154: A company requires hard drives to be securely wiped before s...
Question 155: Which of the following is used to quantitatively measure the...
Question 156: You are security administrator investigating a potential inf...
Question 157: A recent penetration test identified that an attacker could ...
Question 158: An external vendor recently visited a company's headquarters...
Question 159: A systems administrator receives the following alert from a ...
Question 160: A security engineer is implementing FDE for all laptops in a...
Question 161: In a rush to meet an end-of-year business goal, the IT depar...