Podcast
Questions and Answers
What type of control is a file integrity monitoring tool?
What type of control is a file integrity monitoring tool?
- Deterrent
- Preventive
- Directive
- Detective (correct)
If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?
If Theresa is worried about her maintenance window exceeding allocated time, which element of the CIA triad is she concerned about?
- Availability (correct)
- Accessibility
- Criticality
- Integrity
To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?
To prevent vehicle impacts on her organization's backup generator near a parking lot, what should Alaina install?
- Bollards (correct)
- A chain-link fence
- A speed bump
- An access control vestibule
What best describes a policy or procedure in terms of security controls?
What best describes a policy or procedure in terms of security controls?
Which security control type is most effective for reducing the threat scope of compromised credentials?
Which security control type is most effective for reducing the threat scope of compromised credentials?
What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?
What control type best describes a data loss prevention (DLP) tool that inspects and flags specific data types before emails are sent outside the organization?
What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?
What type of vulnerability allows software running on a virtual machine to execute code on the system running the VM hypervisor?
Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?
Which hardening option is best suited to protect an organization from ransomware attacks targeting workstations?
In the context of wireless networks, which option is considered the most secure?
In the context of wireless networks, which option is considered the most secure?
Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?
Which type of attack relies on the attacker entering JavaScript into a text area meant for user input, leading to code execution when viewed by other users?
What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?
What element of threat intelligence is associated with unusual outbound network traffic, geographical irregularities, and database read volume increases?
What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?
What technique is used to make a password harder to crack by making it harder to test possible keys during a brute-force attack?
Which control category does log monitoring fall under?
Which control category does log monitoring fall under?
Which of the following is NOT a common technique to make passwords harder to crack?
Which of the following is NOT a common technique to make passwords harder to crack?
What do Diffie-Hellman and RSA represent in the field of encryption?
What do Diffie-Hellman and RSA represent in the field of encryption?
Which process should Sally create to handle the possibility of a failed change in her change management process?
Which process should Sally create to handle the possibility of a failed change in her change management process?
In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?
In the context of password security, what is the term for making a password more complex by increasing the time and resources required to crack it?