1. The security administrator receives an email on a non-company account from a coworker stating that some reports are not exporting correctly. Attached to the email was an example report file with several customers' names and credit card numbers with the PIN. Which of the following is the BEST technical controls that will help mitigate this risk of disclosing sensitive data?
A) Create a user training program to identify the correct use of email and perform regular audits to ensure compliance B) Implement a DLP solution on the email gateway to scan email and remove sensitive data or files C) Configure the mail server to require TLS connections for every email to ensure all transport data is encrypted D) Classify all data according to its sensitivity and inform the users of data that is prohibited to share
2. When it comes to cloud computing,if one of the requirements for a project is to have the most control over the systems in the cloud,which of the following is a service model that would be BEST suited for this goal?
A) Virtualization B) Platform C) Software D) Infrastructure
3. When considering IoT systems,which of the following represents the GREATEST ongoing risk after a vulnerability has been discovered?
A) IP address exhaustion B) Not using industry standards C) Tight integration to existing systems D) Difficult-to-update firmware
4. Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
A) The recipient can request future updates to the software using the published MD5 value. B) The recipient can successfully activate the new software patch. C) The recipient can verify the authenticity of the site used to download the patch. D) The recipient can verify integrity of the software patch.
5. When systems,hardware,or software are not supported by the original vendor,it is a vulnerability known as:
A) resource exhaustion B) end-of-life systems C) system sprawl D) a default configuration
Leave a comment