Podcast
Questions and Answers
What is a compensatory control needed for addressing the delta between device vendors?
What is a compensatory control needed for addressing the delta between device vendors?
- Heterogeneous deployment
- Multiple MDM installations (correct)
- SCEP-based enrollment
- MDM support
To protect laptop hard drives against loss or data theft, which technology would be MOST acceptable?
To protect laptop hard drives against loss or data theft, which technology would be MOST acceptable?
- TPM
- DLP
- SED (correct)
- HSM
What can be concluded from a SIEM alert about someone logging into an appadmin test account used for early attack detection?
What can be concluded from a SIEM alert about someone logging into an appadmin test account used for early attack detection?
- Replay attack
- Continuous failed logins
- Changed service account password (correct)
- Injection attack
What issue arises when devices do not support SCEP-based enrollment in a diverse architecture?
What issue arises when devices do not support SCEP-based enrollment in a diverse architecture?
Why might multiple MDMs need to be installed and configured in a heterogeneous device environment?
Why might multiple MDMs need to be installed and configured in a heterogeneous device environment?
Which technology is most suitable for securing user authentication systems against injection attacks?
Which technology is most suitable for securing user authentication systems against injection attacks?
What is the BEST action to allow sharing of important PII with a secure application without compromising security?
What is the BEST action to allow sharing of important PII with a secure application without compromising security?
What could be a reason for the security appliance with an embedded OS to be vulnerable?
What could be a reason for the security appliance with an embedded OS to be vulnerable?
What aspect of the security appliance makes it vulnerable according to the given scenario?
What aspect of the security appliance makes it vulnerable according to the given scenario?
What impact would using Single Sign-On (SSO) have on the resilience and availability of systems?
What impact would using Single Sign-On (SSO) have on the resilience and availability of systems?
To harden a smart switch installed in a hospital's wired network, what additional step should be taken?
To harden a smart switch installed in a hospital's wired network, what additional step should be taken?
In a reduced team situation, what should a cybersecurity administrator use to efficiently operate network and security infrastructure?
In a reduced team situation, what should a cybersecurity administrator use to efficiently operate network and security infrastructure?
What did a security assessment identify when it found DES and 3DES being used on recently deployed production servers?
What did a security assessment identify when it found DES and 3DES being used on recently deployed production servers?
What would be a potential risk of using DES and 3DES on production servers?
What would be a potential risk of using DES and 3DES on production servers?
Why is it important to isolate a smart switch on a separate VLAN?
Why is it important to isolate a smart switch on a separate VLAN?