Question 16

After investigating virus outbreaks that have cost the company $1,000 per incident, the company's Chief Information Security Officer (CISO) has been researching new antivirus software solutions to use and be fully supported for the next two years. The CISO has narrowed down the potential solutions to four candidates that meet all the company's performance and capability requirements:

Using the table above, which of the following would be the BEST business-driven choice among five possible solutions?
  • Question 17

    A security administrator is updating a company's SCADA authentication system with a new application. To ensure interoperability between the legacy system and the new application, which of the following stakeholders should be involved in the configuration process before deployment? (Choose two.)
  • Question 18

    A systems administrator at a medical imaging company discovers protected health information (PHI) on a general purpose file server. Which of the following steps should the administrator take NEXT?
  • Question 19

    The finance department has started to use a new payment system that requires strict PII security restrictions on various network devices. The company decides to enforce the restrictions and configure all devices appropriately. Which of the following risk response strategies is being used?
  • Question 20

    The following has been discovered in an internally developed application:
    Error - Memory allocated but not freed:
    char *myBuffer = malloc(BUFFER_SIZE);
    if (myBuffer != NULL) {
    *myBuffer = STRING_WELCOME_MESSAGE;
    printf("Welcome to: %s\n", myBuffer);
    }
    exit(0);
    Which of the following security assessment methods are likely to reveal this security weakness? (Select TWO).