15 Questions
What is a compensatory control needed for addressing the delta between device vendors?
Multiple MDM installations
To protect laptop hard drives against loss or data theft, which technology would be MOST acceptable?
SED
What can be concluded from a SIEM alert about someone logging into an appadmin test account used for early attack detection?
Changed service account password
What issue arises when devices do not support SCEP-based enrollment in a diverse architecture?
Exposure of private keys to adversaries
Why might multiple MDMs need to be installed and configured in a heterogeneous device environment?
To address vendor security differences
Which technology is most suitable for securing user authentication systems against injection attacks?
HSM
What is the BEST action to allow sharing of important PII with a secure application without compromising security?
Configure the DLP policies to whitelist this application with the specific PII
What could be a reason for the security appliance with an embedded OS to be vulnerable?
The vendor has not supplied a patch for the appliance
What aspect of the security appliance makes it vulnerable according to the given scenario?
Absence of patches from the vendor
What impact would using Single Sign-On (SSO) have on the resilience and availability of systems?
Decrease resilience and availability
To harden a smart switch installed in a hospital's wired network, what additional step should be taken?
Change the default password for the switch
In a reduced team situation, what should a cybersecurity administrator use to efficiently operate network and security infrastructure?
MSSP
What did a security assessment identify when it found DES and 3DES being used on recently deployed production servers?
Unsecure protocols
What would be a potential risk of using DES and 3DES on production servers?
Vulnerability to attacks
Why is it important to isolate a smart switch on a separate VLAN?
To enhance switch security
This quiz addresses a scenario where a financial organization is facing challenges in sharing important Personally Identifiable Information (PII) across a new secure document-sharing platform due to DLP system blocks. It assesses the best actions to enable secure sharing of PII without compromising security posture.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free