Question 136

A Chief Information Security Officer (CISO) is reviewing the controls in place to support the organization's vulnerability management program. The CISO finds patching and vulnerability scanning policies and procedures are in place. However, the CISO is concerned the organization is siloed and is not maintaining awareness of new risks to the organization. The CISO determines systems administrators need to participate in industry security events. Which of the following is the CISO looking to improve?
  • Question 137

    An organization is implementing a virtualized thin-client solution for normal user computing and access. During a review of the architecture, concerns were raised that an attacker could gain access to multiple user environments by simply gaining a foothold on a single one with malware.
    Which of the following reasons BEST explains this?
  • Question 138

    The helpdesk is receiving multiple calls about slow and intermittent Internet access from the finance department. The following information is compiled:
    Caller 1, IP 172.16.35.217, NETMASK 255.255.254.0
    Caller 2, IP 172.16.35.53, NETMASK 255.255.254.0
    Caller 3, IP 172.16.35.173, NETMASK 255.255.254.0
    All callers are connected to the same switch and are routed by a router with five built-in interfaces. The upstream router interface's MAC is 00-01-42-32-ab-1a A packet capture shows the following:
    09:05:15.934840 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:06:16.124850 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:07:25.439811 arp reply 172.16.34.1 is-at 00:01:42:32:ab:1a
    (00:01:42:32:ab:1a)
    09:08:10.937590 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2305, seq 1, length 65534
    09:08:10.937591 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2306, seq 2, length 65534
    09:08:10.937592 IP 172.16.35.1 > 172.16.35.255: ICMP echo request, id
    2307, seq 3, length 65534
    Which of the following is occurring on the network?
  • Question 139

    An organization has implemented an Agile development process for front end web application development. A new security architect has just joined the company and wants to integrate security activities into the SDLC.
    Which of the following activities MUST be mandated to ensure code quality from a security perspective? (Select TWO).
  • Question 140

    A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data
    owner has established the following security requirements:
    The data is for internal consumption only and shall not be distributed to outside individuals

    The systems administrator should not have access to the data processed by the server

    The integrity of the kernel image is maintained

    Which of the following host-based security controls BEST enforce the data owner's requirements?
    (Choose three.)