A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.
What is the most important factor to consider when evaluating the severity of the ransomware attack?
The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.
Which type of file should the analyst use to inspect the traffic?
Which risk management strategy will ensure the secure storage of data on a new document management system?
Which risk management strategy will help prevent cheating using a learning management system as a platform?
An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.
What is the best solution?
Which IT role is responsible for the installation and maintenance of hardware and software that make up a computer network?
A software development company uses file transfer protocol (FTP) to transfer software code between different teams.
Which security control is essential for protecting the integrity of software code that is transferred using FTP?
Which security technique should be used to prevent data exfiltration?
What does the following SQL statement produce when executed?
SELECT ‘ FROM Customers
WHERE State = 'Arizona';
A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.
What is the best solution?