Question 216
Which of the following policies BEST explains the purpose of a data ownership policy?
Question 217
A recent audit has uncovered several coding errors and a lack of input validation being used on a public
portal. Due to the nature of the portal and the severity of the errors, the portal is unable to be patched.
Which of the following tools could be used to reduce the risk of being compromised?
portal. Due to the nature of the portal and the severity of the errors, the portal is unable to be patched.
Which of the following tools could be used to reduce the risk of being compromised?
Question 218
A new zero day vulnerability was discovered within a basic screen capture app, which is used throughout the environment Two days after discovering the vulnerability, the manufacturer of the software has not announced a remediation or it there will be a fix for this newly discovered vulnerability. The vulnerable application is not uniquely critical, but it is used occasionally by the management and executive management teams The vulnerability allows remote code execution to gam privileged access to the system Which of the following is the BEST course of action to mitigate this threat'
Question 219
A retail corporation with widely distributed store locations and IP space must meet PCI requirements
relating to vulnerability scanning. The organization plans to outsource this function to a third party to
reduce costs.
Which of the following should be used to communicate expectations related to the execution of scans?
relating to vulnerability scanning. The organization plans to outsource this function to a third party to
reduce costs.
Which of the following should be used to communicate expectations related to the execution of scans?
Question 220
A cybersecurity professional wants to determine if a web server is running on a remote host with the IP address 192.168.1.100. Which of the following can be used to perform this task?