Podcast
Questions and Answers
What type of control is a file integrity monitoring tool?
What type of control is a file integrity monitoring tool?
If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?
If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?
To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?
To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?
What best describes a policy or procedure in terms of security controls?
What best describes a policy or procedure in terms of security controls?
Signup and view all the answers
Which security control type is most effective for reducing the threat scope of compromised credentials?
Which security control type is most effective for reducing the threat scope of compromised credentials?
Signup and view all the answers
What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?
What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?
Signup and view all the answers
What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?
What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?
Signup and view all the answers
Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?
Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?
Signup and view all the answers
In the context of wireless networks, which option is considered the most secure?
In the context of wireless networks, which option is considered the most secure?
Signup and view all the answers
Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?
Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?
Signup and view all the answers
What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?
What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?
Signup and view all the answers
What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?
What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?
Signup and view all the answers
Which control category does log monitoring fall under?
Which control category does log monitoring fall under?
Signup and view all the answers
Which of the following is NOT a common technique to make passwords harder to crack?
Which of the following is NOT a common technique to make passwords harder to crack?
Signup and view all the answers
What do Diffie-Hellman and RSA represent in the field of encryption?
What do Diffie-Hellman and RSA represent in the field of encryption?
Signup and view all the answers
Which process should Sally create to handle the possibility of a failed change in her change management process?
Which process should Sally create to handle the possibility of a failed change in her change management process?
Signup and view all the answers
In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?
In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?
Signup and view all the answers