Question 36

A security analyst has received the following requirements for the implementation of enterprise credential management software.
* The software must have traceability back to an individual
* Credentials must remain unknown to the vendor at all times
* There must be forced credential changes upon ID checkout
* Complexity requirements must be enforced.
* The software must be quickly and easily scalable with max mum availability Which of the following vendor configurations would BEST meet these requirements?
  • Question 37

    An organization is engaged in international business operations and is required to comply with various legal frameworks. In addition to changes in legal frameworks, which of the following is a primary purpose of a compliance management program?
  • Question 38

    A Chief Information Officer (CIO) publicly announces the implementation of a new financial system. As part of a security assessment that includes a social engineering task, which of the following tasks should be conducted to demonstrate the BEST means to gain information to use for a report on social vulnerability details about the financial system?
  • Question 39

    A business is growing and starting to branch out into other locations. In anticipation of opening an office in a different country, the Chief Information Security Officer (CISO) and legal team agree they need to meet the following criteria regarding data to open the new office:
    Store taxation-related documents for five years
    Store customer addresses in an encrypted format
    Destroy customer information after one year
    Keep data only in the customer's home country
    Which of the following should the CISO implement to BEST meet these requirements? (Choose three.)
  • Question 40

    A security analyst is reviewing the following packet capture of communication between a host and a company's router:

    Which of the following actions should the security analyst take to remove this vulnerability?