What type of access control determines the authorization to resource based on pre-defined job titles within an organization?
An organization with divisions in the United States (US) and the United Kingdom (UK) processes data comprised of personal information belonging to subjects living in the European Union (EU) and in the US. Which data MUST be handled according to the privacy protections of General Data Protection Regulation (GDPR)?
Which of the following is a PRIMARY challenge when running a penetration test?
An organization has implemented a password complexity and an account lockout policy enforcing five incorrect logins tries within ten minutes. Network users have reported significantly increased account lockouts. Which of the following security principles is this company affecting?
In a DevOps environment, which of the following actions is MOST necessary to have confidence in the quality of the changes being made?
An application developer receives a report back from the security team showing their automated tools were able to successfully enter unexpected data into the organization's customer service portal, causing the site to crash. This is an example of which type of testing?
Which type of access control includes a system that allows only users that are type=managers and department=sales to access employee records?
Which of the following is the MOST effective preventative method to identify security flaws in software?
A vehicle of a private courier company that transports backup data for offsite storage was robbed while in transport backup data for offsite was robbed while in transit. The incident management team is now responsible to estimate the robbery, which of the following would help the incident management team to MOST effectively analyze the business impact of the robbery?
Which software defined networking (SDN) architectural component is responsible for translating network requirements?
As part of an application penetration testing process, session hijacking can BEST be achieved by which of the following?
The design review for an application has been completed and is ready for release. What technique should an organization use to assure application integrity?
Which of the following is the MOST effective practice in managing user accounts when an employee is terminated?
The organization would like to deploy an authorization mechanism for an Information Technology (IT)
infrastructure project with high employee turnover.
Which access control mechanism would be preferred?
Which of the following MUST be in place to recognize a system attack?