A computer in the factory that controls a grinding machine,…

A computer in the factory that controls a grinding machine, is running an operating system that no longer receives security patches from the vendor. The cyber team realizes this system poses threats to the network, but unfortunately the application installed on the computer, cannot be updated and will not run on a newer version of the operating system. What is the MOST effective way to reduce this potential attack vector

An international organization is experiencing a series of at…

An international organization is experiencing a series of attacks in which a collective of attackers are simultaneously attempting to damage the organization’s reputation. The attackers are not requesting any financial payments, but are threatening to expose exfiltrated data they claim is damaging to the organization. Which of the following BEST describes these threat actors

You are a cybersecurity manager tasked with protecting extre…

You are a cybersecurity manager tasked with protecting extremely sensitive cryptographic key data. Several mitigation techniques have been implemented to protect the key data while at rest. However, the CISO is concerned about compromise of the key data while in an active, unencrypted state on an end-user’s workstation. Which of the following will BEST mitigate the CISO’s concern

Your company recently underwent a repeated series of attacks…

Your company recently underwent a repeated series of attacks in which unauthorized individuals attempted physical access to your buildings. Building services has installed signs indicating the ramifications of unauthorized entry. Which of the following controls has been put in place