Question 111

A security analyst is attempting to configure a vulnerability scan for a new segment on the network. Given the requirement to prevent credentials from traversing the network while still conducting a credentialed scan, which of the following is the BEST choice?
  • Question 112

    A company has a large number of users who need to access corporate resources or networks from various locations. Many users have VPN access to the network, as well as wireless internet access from BYOD approved systems tablets and smartphones. The users can also access corporate resources from an internal-facing web portal now ever all of these services require a separate set of credentials. Which of the following should the cybersecurity analyst recommend to aggregate and audit on logins while allowing the corporate directory services credentials to be shared across all of the services?
  • Question 113

    A new security manager was hired to establish a vulnerability management program. The manager asked for a corporate strategic plan and risk register that the project management office developed. The manager conducted a tools and skill sets inventory to document the plan. Which of the following is a critical task for the establishment of a successful program?
  • Question 114

    An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue.
    Which of the following should be applied?
  • Question 115

    Several accounting department users are reporting unusual Internet traffic in the browsing history of their
    workstations after returning to work and logging in. The building security team informs the IT security team
    that the cleaning staff was caught using the systems after the accounting department users left for the day.
    Which of the following steps should the IT security team take to help prevent this from happening again?
    (Choose two.)