Question 501
A government organization operates and maintains several ICS environments. The categorization of one of the ICS environments led to a moderate baseline. The organization has complied a set of applicable security controls based on this categorization.
Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
Question 502
A security analyst is reviewing an endpoint that was found to have a rookit installed. The rootkit survived multiple attempts to clean the endpoints, as well as an attempt to reinstall the QS. The security analyst needs to implement a method to prevent other endpoint from having similar issues. Which of the following would BEST accomplish this objective?
Question 503
A security policy states that all applications on the network must have a password length of eight characters. There are three legacy applications on the network that cannot meet this policy. One system will be upgraded in six months, and two are not expected to be upgraded or removed from the network. Which of the following processes should be followed?
Question 504
Which of the following is an external pressure that causes companies to hire security assessors and penetration testers?
Question 505
A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following security requirements:
* The data is for internal consumption only and shall not be distributed to outside individuals
* The systems administrator should not have access to the data processed by the server
* The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)
* The data is for internal consumption only and shall not be distributed to outside individuals
* The systems administrator should not have access to the data processed by the server
* The integrity of the kernel image is maintained
Which of the following host-based security controls BEST enforce the data owner's requirements? (Choose three.)