A chief information officer (CIO) recently read an article involving a similar company that was hit with ransomware due to ineffective patch-management practices. The CIO tasks a security profession... al with gathering metrics on the effectiveness of the company's patch-management program to avoid a similar incident. Which method enables the security professional to gather current, accurate metrics? a. Review authenticated vulnerability scan reports b. Review reports from Windows Update c. Review patch history on nonproduction systems d. Review patch tickets in the change control system,a A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate. Which security principle of the CIA triad is affected by the lack of an SSL certificate? a. Confidentiality b. Integrity c. Authentication d. Availability,a A company develops a business continuity plan in addition to an emergency communication plan. What should be included in the company's emergency communication plan? Choose 2 answers. a. Alternate means of contact b. Backup people for each role c. The best time to call each person d. Employee's phone service providers,a, b A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage. Which provisioning should the company perform to provide stable power for a long period of time? a. Purchase generators b. Purchase additional servers c. Create a RAID array d. Create a failover cluster,a A company has identified a massive security breach in its healthcare records department. Over 50% of customers' personally identifiable information (PII) has been stolen. The customers are aware of the breach, and the company is taking actions to protect customer assets through the personal security policy, which addresses PII data. Which preventive measure should the company pursue to protect against future attacks? a. Require cognitive passwords b. Employ password tokens c. Use network-based and host-based firewalls d. Install auditing tools,c A company has signed a contract with a third-party vendor to use the vendor's inventory management system hosted in a cloud. For convenience, the vendor set up the application to use Lightweight Directory Access Protocol (LDAP) queries but did not enable secure LDAP queries or implement a secure sockets layer (SSL) on the application's web server. The vendor does not have the ability to secure the system, and company management insists on using the application. Which defense-in-depth practices should the company implement to minimize the likelihood of an account compromise due to insecure setup by the vendor? a. Location-based access control and multifactor authentication b. Intrusion prevention system (IPS) and honeypot systems c. Antivirus and intrusion detection system (IDS) d. Password hashing and authentication encryption,a A company has user credentials compromised through a phishing attack. Which defense-in-depth practice will reduce the likelihood of misuse of the user's credentials? a. Configure firewall rules b. Deploy multifactor authentication c. Deploy RADIUS authentication d. Configure encryption protocols,b A company hires several contractors each year to augment its IT workforce. The contractors are granted access to the internal corporate network, but they are not provided laptops containing the corporate image. Instead, they are required to bring their own equipment. Which defense-in-depth practice should be required for contractor laptops to ensure that contractors do not connect infected laptops to the internal corporate network? a. Enable command-line audit logging on contractor laptops b. Configure devices to not autorun content c. Configure antimalware scanning of removable devices d. Ensure antimalware software and signatures are updated,d A company is concerned about loss of data on removable media when media are lost or stolen. Which standard should this company implement on all flash drives? a. Maximum password age b. Encryption c. Awareness training d. Layer 2 tunneling protocol,b A company is concerned about securing its corporate network, including its wireless network, to limit security risks. Which defense-in-depth practice represents an application of least privilege? a. Implement mutual multifactor authentication b. Configure Wi-Fi-Protected Access for encrypted communication c. Disable wireless access to users who do not need it d. Implement an intrusion detection system,c A company is concerned about unauthorized network traffic. Which procedure should the company implement to block FTP traffic? a. Install a packet filter b. Update the DNS c. Filter ports 20 and 21 at the firewall d. Decrease the network bandwidth,c A company is concerned about unauthorized programs being used on network devices. Which defense-in-depth strategy would help eliminate unauthorized software on network devices? a. Develop an acceptable use policy and update all network device firmware b. Use application controls tools and update AppLocker group policies c. Limit administrative access to devices and create DHCP scope options d. Upgrade to a 64-bit operating system and install an antimalware application,b A company is concerned about unneeded network protocols being available on the network. Which two defense-in-depth practices should the company implement to detect whether FTP is being used? Choose 2 answers. a. Install BIOS firmware updates b. Perform automated packet scanning c. Implement application firewalls d. Physically segment the network,b, c A company is concerned that disgruntled employees are sending sensitive data to its competitors. Which defense-in-depth practices assist a company in identifying an insider threat? a. Data loss prevention (DLP) and audit logs b. Antivirus and intrusions detection systems (IDS) c. Data loss prevention (DLP) and instusion detection systems (IDS) d. Antivirus and audit logs,a A company is hit with a number of ransomware attacks. These attacks are causing a significant amount of downtime and data loss since users with access to sensitive company documents are being targeted. These attacks have prompted management to invest in new technical controls to prevent ransomware. Which defense-in-depth practices should this company implement? a. Password resets and a log review b. Mandatory vacation and job rotation c. Spam filtering and anti-malware d. Encryption and an internal firewall,c A company is implementing a defense-in-depth approach that includes capturing audit logs. The audit logs need to be written in a manner that provides integrity. Which defense-in-depth strategy should be applied? a. Write the data to a write-once, read-many (WORM) drive b. Write the data to an encrypted hard drive c. Write the data to an encrypted flash drive d. Write the data to an SD card and store the SD card in a safe,a A company is moving its database backups from an off-site location to an alternate processing site warehouse using bulk transfers. Which type of database recovery is this company employing? a. Electronic vaulting b. Remote jounailing c. Remote mirroring d. Mutual assistance,a A company is terminating several employees with high levels of access. The company wants to protect itself from possible disgruntled employees who could become potential insider threats. Which defense-in-depth practices should be applied? a. Account revocation and conducting a vulnerability assessment b. Account revocation and conducting a full backup of critical data c. A mandatory 90-day password change and conducting a full backup of critical data d. A mandatory 90-day password change and conducting a vulnerability assessment,a A company needs to improve its ability to detect and investigate rogue WAPs. Which defense-in-depth practice should be used? a. Configure a captive portal to request information b. Configure MAC address filtering to control access c. Install a wireless IDS to monitor irregular behavior d. Install a stateful firewall to block network connections,c A company notices that someone keeps trying to access its system using different passwords and usernames. What can help mitigate the success of this attack? a. Require a CAPTCHA b. Block the IP address of the user c. Use the user sessions after authentication d. Use cookie authentication,a A company performs a data audit on its critical information every six months. Company policy states that the audit cannot be conducted by the same employee within a two-year time frame. Which principle is this company following? a. Job rotation b. Two person control c. Least privilege d. Need to know,a A company presents team members with a disaster recovery scenario, asks members to develop an appropriate response, and then tests some of the technical responses without shutting down operations at the primary site. Which type of disaster recovery test is being performed? a. Read-through b. Structured walk-through c. Simulation d. Full-interruption,c A company relies exclusively on a system for critical functions. An audit is performed, and the report notes that there is no log review performed on the system. Management has been tasked with selecting the appropriate person to perform the log reviews in order to correct the deficiency. Which role is responsible for reviewing and auditing logs in order to detect any malicious behavior? a. Security Administrator b. System user c. Database administrator d. Senior management,a A company wants to monitor the inbound and outbound flow of packets and not the content. Which defense-in-depth strategy should be implemented? a. The organization should use egress filtering on the network. b. Traffic and trend analyses should be installed on the router. c. The administrator should configure network data loss prevention. d. RADIUS authentication should be used on the bastion host.,b A company wants to prevent cybercriminals from gaining easy access into its email server. The company wants to know which user is accessing which resources and to prevent hackers from easily gaining access to the server. Which defense-in-depth strategy should be used? a. Authenticate users and devices and log events within the network b. Deploy VLANs for traffic separation and coarse-grained security c. Place encryption throughout the network to ensure privacy d. Use stateful firewall technology at the port level and log firewall activity,a A company wants to reduce the risk of an employee with internal knowledge committing an act of sabotage once that employee is no longer with the company. Which control should the company implement to mitigate this risk? a. Deploy an intrusion detection system b. Monitor email for blackmail attempts c. Perform annual employee credit checks d. Enable an access termination procedure,d A company's business operations are disrupted due to a flash flood. Which consequences to business continuity should be addressed in the disaster recovery plan? a. Evaluation of risk from possible flood damage b. Identify essential personnel and decision makers c. Provide flood-response training to the disaster recovery team d. Provision additional backup power sources,a A company's database administrator requires access to a database server to perform maintenance. The director of information technology will provide the database administrator access to the database server but will not provide the database administrator access to all the data within the server's database. Which defense-in-depth practice enhances the company's need-to-know data access strategy? a. Using compartmented mode systems and least privilege b. Using compartmented mode systems and two-person control c. Using dedicated mode systems and least privilege d. Using dedicated mode systems and two-person control,a A company's main asset is a physical working prototype stored in the research and development department. The prototype is not currently connected to the company's network. Which privileged user activity should be monitored? a. Accessing camera logs b. Adding accounts to the administrator group c. Running scripts in PowerShell d. Disabling host firewall,a A company's main asset is its client list stored in the company database, which is accessible to only specific users. The client list contains Health Insurance Portability and Accountability Act (HIPAA) protected data. Which user activity should be monitored? [Show More]
Last updated: 1 year ago
Preview 1 out of 11 pages
Information Technology> QUESTIONS & ANSWERS > IQT Block 2 (All)
IQT Block 2 What are the major components of the E-3 ESMS? - ✔✔Antennas Fwd & aft Electronic Racks E77 Cabinet Circuit Breakers Software Mode of transmitting on one antenna and receiving on anot...
By Nutmegs , Uploaded: Jan 20, 2023
Information Technology> QUESTIONS & ANSWERS > CIPP/U.S. Practice Questions (All)
CIPP/U.S. Practice Questions Which is the best description of the U.S. legal concept of "preemption"? - ANS - The superior government has the right to supersede the lesser government's laws. The les...
By Nutmegs , Uploaded: Oct 11, 2022
Information Technology> QUESTIONS & ANSWERS > WGU INFORMATION MANAGEMENT AND THE APPLICATION OF TECHNOLOGY C468 ALREADY PASSED (All)
WGU INFORMATION MANAGEMENT AND THE APPLICATION OF TECHNOLOGY C468 ALREADY PASSED CLINICAL INFORMATION SYSTEM ✔✔-LABORATORY SYSTEM - ORDER ENTRY SYSTEM - MONITORING SYSTEM information literacy ✔✔...
By Nutmegs , Uploaded: Aug 23, 2022
Information Technology> QUESTIONS & ANSWERS > BA 63272 CHAPTER 13 QUIZ Information Systems Security (All)
BA 63272 CHAPTER 13 QUIZ Information Systems Security Question 1 Correct 5.00 points out of 5.00 Flag question Question text A __________ infrastructure is made available to the general public o...
By QUIZ HERO , Uploaded: Sep 03, 2021
Information Technology> QUESTIONS & ANSWERS > ITN 266- Chapter 4 Questions and Answers (All)
ITN 266- Chapter 4 Questions and Answers
By luzlinkuz , Uploaded: Aug 19, 2022
Information Technology> QUESTIONS & ANSWERS > Bid data and hadoop mcqs (All)
Bid data and hadoop mcqs Question 1: Point out the correct statement: (A) Applications can use the Reporter to report progress (B) The HadoopMapReduce framework spawns one map task for each InputSp...
By Cheryshev , Uploaded: Sep 08, 2021
Information Technology> QUESTIONS & ANSWERS > AWS Examinable questions with accurate answers. Rated A. 2022/2023. (All)
AWS Examinable questions with accurate answers. Rated A. 2022/2023. AWS Examinable questions with accurate answers. Rated A. 2022/2023. What are the advantages of cloud computing over on-premi...
By Topmark , Uploaded: Oct 13, 2022
Information Technology> QUESTIONS & ANSWERS > CySA+ 2022 Questions and Answers with complete solution, 100% Proven pass rate (All)
B. >>>1. The help desk informed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email...
By bundleHub Solution guider , Uploaded: Sep 23, 2022
Information Technology> QUESTIONS & ANSWERS > WGU C839- test Questions and Answers Already Passed (All)
What is the block and key size for Blowfish ✔✔- 64 bit block - 32-448 bit key What term from the list below best describes a data concealment for covert communication that makes use of LSB replacem...
By clairel^ , Uploaded: Oct 14, 2022
Information Technology> QUESTIONS & ANSWERS > COMPTIA A+ Exam 2 WGU, Exam Questions with accurate answers, Graded A+ (All)
COMPTIA A+ Exam 2 WGU, Exam Questions with accurate answers, Graded A+ Where does Windows display the amount of RAM currently installed in a PC? - ✔✔In the System Control Panel applet How does...
By bundleHub Solution guider , Uploaded: Aug 27, 2022
Connected school, study & course
About the document
Aug 10, 2022
Number of pages
This document has been written for:
Aug 10, 2022
Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students
Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.
Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality
Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.
Florida State University
Great way to get paid for all of the hard work!.
It is an excellent site to post assignment.
Florida State University
Awesome and a great way to make money!.
Thank you so much for this nice platform.
University Of South Florida
Great! It is a good place to share knowledge.
University of Windsor
G D Goenka University
It is helpful Platform for offering the notes
Louisiana State University
I love this site, they make everything so easy
Florida State University
Great tool for learning! I wish you success.
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
Copyright © Browsegrades · High quality services·