Podcast
Questions and Answers
What tool is effective in preventing a user from accessing unauthorized removable media?
What tool is effective in preventing a user from accessing unauthorized removable media?
- USB data blocker (correct)
- Proximity reader
- Faraday cage
- Cable lock
What should the company do to accomplish the goal of assigning different DLP rules based on the type of data on the file server?
What should the company do to accomplish the goal of assigning different DLP rules based on the type of data on the file server?
- Perform a risk analysis
- Assign the application owner
- Classify the data (correct)
- Mask the data
For a secure file transfer solution over the internet to a business partner, what can be used?
For a secure file transfer solution over the internet to a business partner, what can be used?
- S/MIME
- LDAPS
- SRTP
- SSH (correct)
What is the BEST remediation strategy for critical vulnerabilities detected on applications running inside containers?
What is the BEST remediation strategy for critical vulnerabilities detected on applications running inside containers?
Which standard is the BEST source for the security analyst to develop a risk management program?
Which standard is the BEST source for the security analyst to develop a risk management program?
What incident response process is the CISO requesting for potential areas of improvement following a security incident?
What incident response process is the CISO requesting for potential areas of improvement following a security incident?
Which statement BEST describes zero-day exploits?
Which statement BEST describes zero-day exploits?
What should the security analyst do NEXT after activating the CSIRT due to malware spreading through the corporate network?
What should the security analyst do NEXT after activating the CSIRT due to malware spreading through the corporate network?
What is the MOST likely attack conducted on the environment based on the SIEM entries?
What is the MOST likely attack conducted on the environment based on the SIEM entries?
Which authentication method uses SAML?
Which authentication method uses SAML?