Handling PII Sharing in a Financial Organization
15 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a compensatory control needed for addressing the delta between device vendors?

  • Heterogeneous deployment
  • Multiple MDM installations (correct)
  • SCEP-based enrollment
  • MDM support

To protect laptop hard drives against loss or data theft, which technology would be MOST acceptable?

  • TPM
  • DLP
  • SED (correct)
  • HSM

What can be concluded from a SIEM alert about someone logging into an appadmin test account used for early attack detection?

  • Replay attack
  • Continuous failed logins
  • Changed service account password (correct)
  • Injection attack

What issue arises when devices do not support SCEP-based enrollment in a diverse architecture?

<p>Exposure of private keys to adversaries (A)</p> Signup and view all the answers

Why might multiple MDMs need to be installed and configured in a heterogeneous device environment?

<p>To address vendor security differences (D)</p> Signup and view all the answers

Which technology is most suitable for securing user authentication systems against injection attacks?

<p>HSM (C)</p> Signup and view all the answers

What is the BEST action to allow sharing of important PII with a secure application without compromising security?

<p>Configure the DLP policies to whitelist this application with the specific PII (A)</p> Signup and view all the answers

What could be a reason for the security appliance with an embedded OS to be vulnerable?

<p>The vendor has not supplied a patch for the appliance (C)</p> Signup and view all the answers

What aspect of the security appliance makes it vulnerable according to the given scenario?

<p>Absence of patches from the vendor (C)</p> Signup and view all the answers

What impact would using Single Sign-On (SSO) have on the resilience and availability of systems?

<p>Decrease resilience and availability (C)</p> Signup and view all the answers

To harden a smart switch installed in a hospital's wired network, what additional step should be taken?

<p>Change the default password for the switch (D)</p> Signup and view all the answers

In a reduced team situation, what should a cybersecurity administrator use to efficiently operate network and security infrastructure?

<p>MSSP (C)</p> Signup and view all the answers

What did a security assessment identify when it found DES and 3DES being used on recently deployed production servers?

<p>Unsecure protocols (C)</p> Signup and view all the answers

What would be a potential risk of using DES and 3DES on production servers?

<p>Vulnerability to attacks (D)</p> Signup and view all the answers

Why is it important to isolate a smart switch on a separate VLAN?

<p>To enhance switch security (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser