A Chief Information Security Officer would like to conduct frequent, detailed reviews of systems and procedures to track compliance objectives. Which of the following is the best method to achieve this objective?
Which of the following allows an exploit to go undetected by the operating system?
A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?
A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?
A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?
A company is changing its mobile device policy. The company has the following requirements:
Company-owned devices
Ability to harden the devices
Reduced security risk
Compatibility with company resources
Which of the following would best meet these requirements?
An employee used a company's billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?
An organization has recently decided to implement SSO. The requirements are to leverage access tokens and focus on application authorization rather than user authentication. Which of the following solutions would the engineering team most likely configure?
Which of the following is used to quantitatively measure the criticality of a vulnerability?
A user would like to install software and features that are not available with a smartphone's default software. Which of the following would allow the user to install unauthorized software and enable new features?
Which of the following should a security analyst consider when prioritizing remediation efforts against known vulnerabilities?
A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?
Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
Which of the following documents details how to accomplish a technical security task?
An organization is struggling with scaling issues on its VPN concentrator and internet circuit due to remote work. The organization is looking for a software solution that will allow it to reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data center and monitoring of remote employee internet traffic. Which of the following will help achieve these objectives?