Question 266

Which of the following is the GREATEST security concern with respect to BYOD?
  • Question 267

    A company that has been breached multiple times is looking to protect cardholder data. The previous undetected attacks all mimicked normal administrative-type behavior. The company must deploy a host solution to meet the following requirements:
    * Detect administrative actions
    * Block unwanted MD5 hashes
    * Provide alerts
    * Stop exfiltration of cardholder data
    Which of the following solutions would BEST meet these requirements? (Choose two.)
  • Question 268

    A Chief Financial Officer (CFO) has raised concerns with the Chief Information Security Officer (CISO) because money has been spent on IT security infrastructure, but corporate assets are still found to be vulnerable. The business recently funded a patch management product and SOE hardening initiative. A third party auditor reported findings against the business because some systems were missing patches. Which of the following statements BEST describes this situation?
  • Question 269

    A risk manager has decided to use likelihood and consequence to determine the risk of an event occurring to a company asset. Which of the following is a limitation of this approach to risk management?
  • Question 270

    Which of the following is a major goal of stakeholder engagement?