Which of the following describes a situation where a user is authorized before being authenticated?
Which of the following can assist in recovering data if the decryption key is lost?
A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?
Which of the following threat actors would most likely deface the website of a high-profile music group?
Which of the following best explains how open service ports increase an organization's attack surface?
A company uses its backups to recover from a ransomware attack. Which of the following best guarantees that the backups are not infected?
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
An accounting employee recently used software that was not approved by the company. Which of the following risks does this most likely represent?
An IT team rolls out a new management application that uses a randomly generated MFA token sent to the administrator’s phone. Despite this new MFA precaution, there is a security breach of the same software. Which of the following describes this kind of attack?
A security team installs an IPS on an organization's network and needs to configure the system to detect and prevent specific network attacks. Which of the following settings should the team configure first within the IPS?
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Which of the following is the most likely way a rogue device was allowed to connect?
Which of the following best describes a method for ongoing vendor monitoring in third-party risk management?
A security engineer is working to address the growing risks that shadow IT services are introducing to the organization. The organization has taken a cloud-first approach end does not have an on-premises IT infrastructure. Which of the following would best secure the organization?
Which of the following is the most common data loss path for an air-gapped network?