You are a cybersecurity manager tasked with protecting extre…

You are a cybersecurity manager tasked with protecting extremely sensitive cryptographic key data. Several mitigation techniques have been implemented to protect the key data while at rest. However, the CISO is concerned about compromise of the key data while in an active, unencrypted state on an end-user’s workstation. Which of the following will BEST mitigate the CISO’s concern

Your company recently underwent a repeated series of attacks…

Your company recently underwent a repeated series of attacks in which unauthorized individuals attempted physical access to your buildings. Building services has installed signs indicating the ramifications of unauthorized entry. Which of the following controls has been put in place

The accounting department received an email from the CEO req…

The accounting department received an email from the CEO requesting that funds be wire transferred to a supplier’s account, as prepayment for a large purchase. Upon checking the request, the accountant determines the request did not actually come from the CEO, and no purchase was actually being made. Which threat vector was used for this attempted attack