<< Prev Question Next Question >>

Question 29/54

An IT security engineer grants an auditor access to a conference room and provides temporary wireless access to them to conduct an analysis for the company's annual financial report.
Which category addresses the ability to prevent access to the Internet while being able to browse a designated set of folders on the LAN?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (54q)
Question 1: What common process conducted by organizations when protecti...
Question 2: A new employee is starting work at your company. When should...
Question 3: The information security manager for a major web based retai...
Question 4: What database is used to record and manage assets?...
Question 5: The Backup Recovery Plan is dependent on what effort?...
Question 6: A continuously updated CMDB is an output of which NIST funct...
Question 7: What is the primary driver of a successful implementation of...
Question 8: What must be included in the CMDB?...
Question 9: What is a consideration when developing a Disaster Recovery ...
Question 10: The project manager of a data center has a budget of $1,500,...
Question 11: To generate an accurate risk assessment, organizations need ...
Question 12: What specifically addresses cyber-attacks against an organiz...
Question 13: What procedure is designed to enable security personnel to d...
Question 14: Your organization was breached. You informed the CSIRT and t...
Question 15: The Disaster Recovery Plan must document what effort in orde...
Question 16: Concerning a risk management strategy, what should the execu...
Question 17: What determines the approach taken to communicate to custome...
Question 18: A company suffers a data breach and determines that the thre...
Question 19: A security engineer is responsible for monitoring company so...
Question 20: You have been asked by your organization to: - Assist in dev...
Question 21: Which document is designed to limit damage, reduce recovery ...
Question 22: What is highlighted by the Cyber Resilient Lifecycle?...
Question 23: Match the security event to its description. (Exhibit)...
Question 24: What is used to identify critical systems, networks, and dat...
Question 25: What is the purpose of a baseline assessment?...
Question 26: What are the main components of the NIST Cybersecurity Frame...
Question 27: The CSF recommends that the Communication Plan for an IRP in...
Question 28: What contains a predefined set of efforts that describes an ...
Question 29: An IT security engineer grants an auditor access to a confer...
Question 30: What method identifies the 'delta' in projected time for RTO...
Question 31: What is the effect of changing the Baseline defined in the N...
Question 32: What is an accurate statement concerning the Cyber Resilient...
Question 33: What are the four tiers of integration within the NIST Cyber...
Question 34: What is the purpose of separation of duties?...
Question 35: What is considered outside the scope of a BIA?...
Question 36: Which category addresses the detection of unauthorized code ...
Question 37: A company opened eight new offices. To save money, the CFO o...
Question 38: In which function is the SDLC implemented?...
Question 39: Refer to the exhibit. (Exhibit) What is shown?...
Question 40: What is the main goal of a gap analysis in the Identify func...
Question 41: What is a result of an incomplete organizational asset ident...
Question 42: The network security team in your company has discovered a t...
Question 43: An incident has occurred. You restore backups onto mission/b...
Question 44: The CSIRT team is following the existing recovery plans on n...
Question 45: A company failed to detect a breach of their production syst...
Question 46: What could be considered a set of cybersecurity activities, ...
Question 47: What is the primary focus of the BIA?...
Question 48: What entity offers a framework that is ideally suited to han...
Question 49: Your firewall blocked several machines on your network from ...
Question 50: A company implemented an intrusion detection system. They no...
Question 51: What identifies the value of data to an organization so that...
Question 52: Which type of risk has the potential for the largest monetar...
Question 53: What should be inventoried within an organization using an a...
Question 54: Which mechanism within the NIST Cybersecurity Framework desc...