Which of the following best represents how frequently an incident is expected to happen each year?
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?
Which of the following is most likely in a responsibility matrix in a cloud computing environment?
Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?
A security technician determines that no additional patches can be applied to an application and the risks of operating as such must be accepted. Additionally, only a limited number of network services should utilize the application. Which of the following best describes this type of mitigation?
A company discovers suspicious transactions that were entered into the company ' s database and attached to a user account that was created as a trap for malicious activity. Which of the following is the user account an example of?
An enterprise security team is researching a new security architecture to better protect the company ' s networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?
After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?
Which of the following best describes a method for ongoing vendor monitoring in third-party risk management?
Which of the following can be best used to discover a company ' s publicly available breach information?
A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?
Which of the following is the best way to secure an on-site data center against intrusion from an insider?
An organization failed to account for the right-to-be-forgotten regulations. Which of the following impacts might this action have on the company?
A company wants to track modifications to the code that is used to build new virtual servers. Which of the following will the company most likely deploy?