A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.
Which protocol will meet the needs of this provider?
Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?
Which risk management strategy will help defeat piracy efforts on a new patient management system?
A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.
Which security measure will meet the needs of this company?
A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.
What is the most effective risk management strategy for this vulnerability?
A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.
What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?
A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.
Which threat hunting technique should be used to identify potential attacks that have already occurred?
A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.
What is the term used to describe this metric?
An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.
A security team has been informed that user data on the network has been compromised.
What is the first step the organization should take to respond to this data breach?
During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?
Which risk management strategy will help prevent cheating using a learning management system as a platform?
When is it better to purchase software rather than build a software solution in-house?
A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.
Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?
A company has discovered a vulnerability in its domain name system (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.
What is the most effective risk management strategy for this vulnerability?
What does the following SQL statement produce when executed?
SELECT ‘ FROM Customers
WHERE State = ’Arizona';
A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.
What is the best solution?
Which statement best describes the purpose of a business intelligence (Bl) system?
Which IT role is responsible for installing new hardware and troubleshooting existing hardware?
The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.
Which solution fulfills these requirements?
A company is preparing to test its disaster recovery plan, which includes procedures for restoringcritical systems in the event of a disruption. The company wants to conduct a test that is as close to a real disaster as possible without actually disrupting business operations.
Which disaster recovery test will meet the needs of the company?
A retail company has recently implemented a new point of sale (POS) system that is critical to its business.
Which security control is essential for protecting the availability of the POS system?
The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.
Which type of file should the analyst use to inspect the traffic?
A government agency needs to deploy a secure network connection between its offices in Chicago and New York.
What should be used to facilitate this connection?
Which life cycle is part of the process for planning, creating, testing, and deploying information systems?
What is the vocabulary and set of rules for instructing a computer to perform certain tasks?
A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.
What should the grocery chain use for the devices to authenticate?
A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which technique will prevent unauthorized modifications to the BIOS firmware on a server?
How should a security analyst detect a potential structured query language (SQL) injection attack?
A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).
What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?
The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.
A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.
Which strategy should be used to prevent an attacker from gaining unauthorized information?
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?
Which risk management strategy will ensure that data stored on an Enterprise Resource Planning (ERP) system is secure from exploitation in the event of a data breach?
During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.
Which action should be taken to resolve the issue?
A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server. Which strategy should be used to prevent an attacker from gaining unauthorized information?
A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.
What is the term used to describe this metric?
An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.
Which strategy should the agency implement?
An engineer has noticed increased network traffic originating from an unknown IP address. Which action should be taken to analyze the unusual network traffic patterns?
Which item information should be stored in a database to determine an order total?
Which risk management strategy will help prevent cheating using a learning management system as a platform?
A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?
An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.
Which action should be taken to analyze the unusual network traffic patterns?
A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this company?
What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?
Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?
A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient health information. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.
Which protocol will meet the needs of this provider?
A software development company uses file transfer protocol (FTP) to transfer software code between different teams.
Which security control is essential for protecting the integrity of software code that is transferred using FTP?
A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this company?
An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.
Which strategy should be used to enable identity federation in this scenario?
An IT team has been tasked with improving the security of a company’s web applications.
Which threats should the IT team consider detecting when defending the network with a web application firewall (WAF)?