Which IT role is responsible for installing new hardware and troubleshooting existing hardware?
After implementing a risk management plan for a new product launch, a project team conductedregular risk assessments to monitor the effectiveness of their control strategies.
Which step of the risk management life cycle was performed?
Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?
A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.
Which logging mechanism will create an audit trail?
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.
Which risk mitigation strategy will meet the needs of the company?
A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.
Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?
An IT organization has recently suffered multiple data breaches. The security operations center (SOC) team has been tasked with preventing future breaches by implementing user monitoring. The proposed solution must provide insights about unusual user behaviors from a variety of internal corporate resources.
What are two differences between a handheld computer and a desktop?
Choose 2 answers.
The development team has requested permission to use several open-source libraries to build a corporate web application.
Which resource can the security team recommend to ensure these libraries can be trusted?