Question 41

The Chief Executive Officer (CEO) of a company that allows telecommuting has challenged the Chief Security Officer's (CSO) request to harden the corporate network's perimeter. The CEO argues that the company cannot protect its employees at home, so the risk at work is no different.
Which of the following BEST explains why this company should proceed with protecting its corporate network boundary?
  • Question 42

    A medical device company is implementing a new COTS antivirus solution in its manufacturing plant. All
    validated machines and instruments must be retested for interoperability with the new software.
    Which of the following would BEST ensure the software and instruments are working as designed?
  • Question 43

    A medical device company is implementing a new COTS antivirus solution in its manufacturing plant. All validated machines and instruments must be retested for interoperability with the new software. Which of the following would BEST ensure the software and instruments are working as designed?
  • Question 44

    A penetration tester is inspecting traffic on a new mobile banking application and sends the following web request:
    POSThttp://www.example.com/resources/NewBankAccount
    HTTP/1.1
    Content-type: application/json
    {
    "account":
    [
    { "creditAccount":"Credit Card Rewards account"}
    { "salesLeadRef":"www.example.com/badcontent/exploitme.exe"}
    ],
    "customer":
    [
    { "name":"Joe Citizen"}
    { "custRef":"3153151"}
    ]
    }
    The banking website responds with:
    HTTP/1.1 200 OK
    {
    "newAccountDetails":
    [
    { "cardNumber":"1234123412341234"}
    { "cardExpiry":"2020-12-31"}
    { "cardCVV":"909"}
    ],
    "marketingCookieTracker":"JSESSIONID=000000001"
    "returnCode":"Account added successfully"
    }
    Which of the following are security weaknesses in this example? (Select TWO).
  • Question 45

    A forensics analyst suspects that a breach has occurred. Security logs show the company's OS patch system may be compromised, and it is serving patches that contain a zero-day exploit and backdoor. The analyst extracts an executable file from a packet capture of communication between a client computer and the patch server. Which of the following should the analyst use to confirm this suspicion?