Barb has been tasked with securing an information system to prevent unauthorized users and systems from gaining access. Which of the following properties will support the desired action
Category: Uncategorized
You are a cybersecurity manager tasked with protecting extre…
You are a cybersecurity manager tasked with protecting extremely sensitive cryptographic key data. Several mitigation techniques have been implemented to protect the key data while at rest. However, the CISO is concerned about compromise of the key data while in an active, unencrypted state on an end-user’s workstation. Which of the following will BEST mitigate the CISO’s concern
Hyper-V Enhanced Session Mode will NOT enable which of the f…
Hyper-V Enhanced Session Mode will NOT enable which of the following features
What is the function of the ESXi Hypervisor component
What is the function of the ESXi Hypervisor component
Your company recently underwent a repeated series of attacks…
Your company recently underwent a repeated series of attacks in which unauthorized individuals attempted physical access to your buildings. Building services has installed signs indicating the ramifications of unauthorized entry. Which of the following controls has been put in place
What is a necessary step when a risk is accepted as an excep…
What is a necessary step when a risk is accepted as an exception or exemption
What responsibility falls on the cloud customer regardless o…
What responsibility falls on the cloud customer regardless of the deployment model
Which type of scan is likely to cause disruptions or perform…
Which type of scan is likely to cause disruptions or performance issues
The accounting department received an email from the CEO req…
The accounting department received an email from the CEO requesting that funds be wire transferred to a supplier’s account, as prepayment for a large purchase. Upon checking the request, the accountant determines the request did not actually come from the CEO, and no purchase was actually being made. Which threat vector was used for this attempted attack
It has been determined that the private key, used to generat…
It has been determined that the private key, used to generate your web server’s SSL/TLS certificate, was stolen during a recent cyberattack. Which action should you take to contend with this incident