1. A company has decided to process credit card transactions directly. Which of the following would meet the requirements for scanning this type of data?
A) Quarterly B) Yearly C) Bi-annually D) Monthly
2. An analyst was tasked with providing recommendations of technologies that are PKI X.509 compliant for a variety of secure functions. Which of the followingtechnologies meet the compatibility requirement? (Select three.)(Select 3answers)
A) AES B) IDEA C) 3DES D) PGP E) PKCS F) SSL/TLS
3. After reading about data breaches at a competing company, senior leaders in an organization have grown increasingly concerned about social engineering attacks.They want to increase awareness among staff regarding this threat, but do not want to use traditional training methods because they regard these methods asineffective. Which of the following approaches would BEST meet the requirements?
A) A poster contest to raise awareness of PII and asking employees to provide examples of data breaches and consequences B) Simulated phishing emails asking employees to reply to the email with their updated phone number and office location C) Classroom training on the dangers of social media followed by a test and gift certificates for any employee getting a perfect score. D) USB drives randomly placed inside and outside the organization that contain a pop-up warning to any users who plug the drive into their computer
4. A technician is running an intensive vulnerability scan to detect which ports are open to exploit. During the scan, several network services are disabled andproduction is affected. Which of the following sources would be used to evaluate which network service was interrupted?
A) Network mapping B) Firewall logs C) NIDS D) Syslog
5. A cybersecurity professional typed in a URL and discovered the admin panel for the e-commerce application is accessible over the open web with the defaultpassword. Which of the following is the MOST secure solution to remediate this vulnerability?
A) Whitelist all corporate IP blocks, require an alphanumeric passphrase for the default password, and require two-factor authentication. B) Change the username and default password, whitelist specific source IP addresses, and require two-factor authentication. C) Rename the URL to a more obscure name, whitelist all corporate IP blocks, and require two-factor authentication. D) Change the default password, whitelist specific source IP addresses, and require two-factor authentication.
Leave a comment