Question 366
A government contractor was the victim of a malicious attack that resulted in the theft of sensitive information. An analyst's subsequent investigation of sensitive systems led to the following discoveries:
- There was no indication of the data owner's or user's accounts being
compromised.
- No database activity outside of previous baselines was discovered.
- All workstations and servers were fully patched for all known
vulnerabilities at the time of the attack.
- It was likely not an insider threat, as all employees passed
polygraph tests.
Given this scenario, which of the following is the MOST likely attack that occurred?
- There was no indication of the data owner's or user's accounts being
compromised.
- No database activity outside of previous baselines was discovered.
- All workstations and servers were fully patched for all known
vulnerabilities at the time of the attack.
- It was likely not an insider threat, as all employees passed
polygraph tests.
Given this scenario, which of the following is the MOST likely attack that occurred?
Question 367
A penetration tester has been contracted to conduct a physical assessment of a site. Which of the following is the MOST plausible method of social engineering to be conducted during this engagement?
Question 368
A firm's Chief Executive Officer (CEO) is concerned that IT staff lacks the knowledge to identify complex vulnerabilities that may exist in a payment system being internally developed. The payment system being developed will be sold to a number of organizations and is in direct competition with another leading product.
The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product's reliability, stability, and performance. Which of the following would provide the MOST thorough testing and satisfy the CEO's requirements?
The CEO highlighted that code base confidentiality is of critical importance to allow the company to exceed the competition in terms of the product's reliability, stability, and performance. Which of the following would provide the MOST thorough testing and satisfy the CEO's requirements?
Question 369
A company runs a well -attended, on-premises fitness club for its employees, about 200 of them each day. Employees want to sync center's login and attendance program with their smartphones. Human resources, which manages the contract for the fitness center, has asked the security architecture to help draft security and privacy requirements. Which of the following would BEST address these privacy concerns?
Question 370
The Chief Information Security Officer (CISO) has asked the security team to determine whether the organization is susceptible to a zero-day exploit utilized in the banking industry and whether attribution is possible. The CISO has asked what process would be utilized to gather the information, and then wants to apply signatureless controls to stop these kinds of attacks in the future. Which of the following are the MOST appropriate ordered steps to take to meet the CISO's request?