A systems administrator discovers a system that is no longer receiving support from the vendor. However, this system and its environment are critical to running the business, cannot be modified, and must stay online. Which of the following risk treatments is the most appropriate in this situation?
While reviewing logs, a security administrator identifies the following code:
Which of the following best describes the vulnerability being exploited?
Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).
Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?
An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?
Which of the following activities are associated with vulnerability management? (Select two).
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?
An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?
Which of the following definitions best describes the concept of log co-relation?
Which of the following scenarios describes a possible business email compromise attack?
A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?
A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?
Which of the following must be considered when designing a high-availability network? (Select two).
A malicious insider from the marketing team alters records and transfers company funds to a personal account. Which of the following methods would be the best way to secure company records in the future?