A customer reports that software the customer downloaded from a public website has malware in it. However, the company that created the software denies any malware in its software at delivery time. Which of the following techniques will address this concern?
Which of the following activities is included in the post-incident review phase?
Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees' normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?
Which of the following should a security team do first before a new web server goes live?
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
Which of the following types of vulnerabilities involves attacking a system to access adjacent hosts?
After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions. Which of the following processes should the human resources department follow to track revisions?
Which of the following is the greatest advantage that network segmentation provides?
A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?
Which of the following is an example of a data protection strategy that uses tokenization?
The management team notices that new accounts that are set up manually do not always have correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline account creation?
A security analyst identifies an incident in the network. Which of the following incident response activities would the security analyst perform next?
Which of the following describes the reason for using an MDM solution to prevent jailbreaking?
Which solution is most likely used in the financial industry to mask sensitive data?