Question 51

The Chief Executive Officer (CEO) of a small startup company has an urgent need for a security policy and assessment to address governance, risk management, and compliance. The company has a resource- constrained IT department, but has no information security staff. The CEO has asked for this to be completed in three months.
Which of the following would be the MOST cost-effective solution to meet the company's needs?
  • Question 52

    A security manager looked at various logs while investigating a recent security breach in the data center from an external source. Each log below was collected from various security devices compiled from a report through the company's security information and event management server.
    Logs:
    Log 1:
    Feb 5 23:55:37.743: %SEC-6-IPACCESSLOGS: list 10 denied 10.2.5.81 3
    packets
    Log 2:
    HTTP://www.company.com/index.php?user=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa Log 3:
    Security Error Alert
    Event ID 50: The RDP protocol component X.224 detected an error in the
    protocol stream and has disconnected the client
    Log 4:
    Encoder oe = new OracleEncoder ();
    String query = "Select user_id FROM user_data WHERE user_name = ` "
    + oe.encode ( req.getParameter("userID") ) + " ` and user_password = `
    "
    + oe.encode ( req.getParameter("pwd") ) +" ` ";
    Vulnerabilities
    Buffer overflow
    SQL injection
    ACL
    XSS
    Which of the following logs and vulnerabilities would MOST likely be related to the security breach? (Select TWO).
  • Question 53

    During the decommissioning phase of a hardware project, a security administrator is tasked with ensuring no sensitive data is released inadvertently. All paper records are scheduled to be shredded in a crosscut shredder, and the waste will be burned. The system drives and removable media have been removed prior to e-cycling the hardware.
    Which of the following would ensure no data is recovered from the system drives once they are disposed of?
  • Question 54

    A software development firm wants to validate the use of standard libraries as part of the software development process Each developer performs unit testing prior to committing changes to the code repository.
    Which of the following activities would be BEST to perform after a commit but before the creation of a branch?
  • Question 55

    CORRECT TEXT
    A security analyst is reviewing logs and discovers that a company-owned computer issued to an employee is generating many alerts and analyst continues to review the log events and discovers that a non-company-owned device from a different, unknown IP address is general same events. The analyst informs the manager of these finding, and the manager explains that these activities are already known and . . . ongoing simulation. Given this scenario, which of the following roles are the analyst, the employee, and the manager fillings?