After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?
A security report shows that during a two-week test period. 80% of employees unwittingly disclosed their SSO credentials when accessing an external website. The organization purposelycreated the website to simulate a cost-free password complexity test. Which of the following would best help reduce the number of visits to similar websites in the future?
Which of the following would be the best solution to deploy a low-cost standby site that includes hardware and internet access?
Which of the following would most likely be used by attackers to perform credential harvesting?
A security analyst is reviewing logs and discovers the following:
Which of the following should be used lo best mitigate this type of attack?
Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?
Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).
Which of the following control types describes an alert from a SIEM tool?
Which of the following is the most likely benefit of conducting an internal audit?
Which of the following topics would most likely be included within an organization's SDLC?
Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?
A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.
Which of the following is the most important consideration during development?
Which of the following is the most common data loss path for an air-gapped network?