Question 51

A user from the sales department opened a suspicious file attachment. The sales department then contacted the SOC to investigate a number of unresponsive systems, and the team successfully identified the file and the origin of the attack.
Which of the following is the NEXT step of the incident response plan?
  • Question 52

    A networking team was asked to provide secure remote access to all company employees. The team decided to use client-to-site VPN as a solution. During a discussion, the Chief Information Security Officer raised a security concern and asked the networking team to route the Internet traffic of remote users through the main office infrastructure. Doing this would prevent remote users from accessing the Internet through their local networks while connected to the VPN.
    Which of the following solutions does this describe?
  • Question 53

    Which of the following is required for an organization to meet the ISO 27018 standard?
  • Question 54

    A forensic expert working on a fraud investigation for a US-based company collected a few disk images as evidence.
    Which of the following offers an authoritative decision about whether the evidence was obtained legally?
  • Question 55

    Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?