Question 226

A security engineer is responsible for monitoring company applications for known vulnerabilities. Which of the following is a way to stay current on exploits and information security news?
  • Question 227

    An organization wants to allow its employees to receive corporate email on their own smartphones. A security analyst is reviewing the following information contained within the file system of an employee's smartphone:
    FamilyPix.jpg
    Taxreturn.tax
    paystub.pdf
    employeesinfo.xls
    SoccerSchedule.doc
    RecruitmentPlan.xls
    Based on the above findings, which of the following should the organization implement to prevent further exposure? (Choose two.)
  • Question 228

    A system administrator has a responsibility to maintain the security of the video teleconferencing system.
    During a self-audit of the video teleconferencing room, the administrator notices that speakers and microphones are hard-wired and wireless enabled.
    Which of the following security concerns should the system administrator have about the existing technology in the room?
  • Question 229

    A security controls assessor intends to perform a holistic configuration compliance test of networked assets. The assessor has been handed a package of definitions provided in XML format, and many of the files have two common tags within them: "<object object_ref=... />"and "<state state_ref=...
    />".Which of the following tools BEST supports the use of these definitions?
  • Question 230

    The Chief Information Security Officer (CISO) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether attribution is possible. The CISO has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. Which of the following are the MOST appropriate ordered steps to take to meet the CISO's request?