Podcast
Questions and Answers
What step in the incident response process is the administrator following when they image the operating system to a known-good version?
What step in the incident response process is the administrator following when they image the operating system to a known-good version?
What security practice is being followed when a company places a SCADA system on a segmented network with limited access?
What security practice is being followed when a company places a SCADA system on a segmented network with limited access?
What type of attack is being described in the security log that shows multiple failed password attempts from the same IP address?
What type of attack is being described in the security log that shows multiple failed password attempts from the same IP address?
What process is being described when a user's laptop is moved to a private VLAN and updates are automatically installed?
What process is being described when a user's laptop is moved to a private VLAN and updates are automatically installed?
Signup and view all the answers
What is the primary goal of data loss prevention (DLP) systems?
What is the primary goal of data loss prevention (DLP) systems?
Signup and view all the answers
What is the purpose of DNS filtering in an organization?
What is the purpose of DNS filtering in an organization?
Signup and view all the answers
What type of data is typically not shared with other organizations or businesses?
What type of data is typically not shared with other organizations or businesses?
Signup and view all the answers
Which of the following is a requirement for the security team to implement according to the insurance company's policy?
Which of the following is a requirement for the security team to implement according to the insurance company's policy?
Signup and view all the answers
What is the primary goal of implementing time-of-day restrictions on the authentication server?
What is the primary goal of implementing time-of-day restrictions on the authentication server?
Signup and view all the answers
Which of the following is a recommended implementation to meet the insurance company's policy requirement for data access?
Which of the following is a recommended implementation to meet the insurance company's policy requirement for data access?
Signup and view all the answers
What is the primary benefit of consolidating all logs on a SIEM?
What is the primary benefit of consolidating all logs on a SIEM?
Signup and view all the answers
Which of the following is NOT a requirement for the security team to implement according to the insurance company's policy?
Which of the following is NOT a requirement for the security team to implement according to the insurance company's policy?
Signup and view all the answers
What type of alert would a system administrator receive when access rights are changed on a database containing private customer information?
What type of alert would a system administrator receive when access rights are changed on a database containing private customer information?
Signup and view all the answers
What is the primary concern of a security administrator regarding external storage drives?
What is the primary concern of a security administrator regarding external storage drives?
Signup and view all the answers
What would be the BEST way to prevent data exfiltration using external storage drives?
What would be the BEST way to prevent data exfiltration using external storage drives?
Signup and view all the answers
What type of data would a company's quarterly government reports be classified as?
What type of data would a company's quarterly government reports be classified as?
Signup and view all the answers
What would be the purpose of an insurance company's set of policies to handle data breaches?
What would be the purpose of an insurance company's set of policies to handle data breaches?
Signup and view all the answers
What is the main goal of implementing access control measures on a database containing private customer information?
What is the main goal of implementing access control measures on a database containing private customer information?
Signup and view all the answers