Question 56

A company is performing an analysis of the corporate enterprise network with the intent of identifying what will cause losses in revenue, referrals, and/or reputation when out of commission. Which of the following is an element of a BIA that is being addressed?
  • Question 57

    While working on an incident, Joe, a technician, finished restoring the OS and applications on a workstation from the original medi Joe is about to begin copying the user's files back onto the hard drive. Which of the following incident response steps is Joe working on now?
  • Question 58

    A security administrator wants to implement least privilege access for a network share that stores sensitive company data. The organization is particularly concerned with the integrity of data and implementing discretionary access control. The following controls are available:
    - Read = A user can read the content of an existing file.
    - White = A user can modify the content of an existing file and delete
    an existing file.
    - Create = A user can create a new file and place data within the file.
    A missing control means the user does not have that access. Which of the following configurations provides the appropriate control to support the organization/s requirements?
  • Question 59

    A security engineer implements multiple technical measures to secure an enterprise network. The engineer also works with the Chief information Ofcer (CID) to implement policies to govern user behavior. Which of the following strategies is the security engineer executing?
  • Question 60

    The Chief Executive Officer (CEO) of a major defense contracting company a traveling overseas for a conference. The CEO will be taking a laptop. Which of the following should the security administrator implement to ensure confidentiality of the data if the laptop were to be stolen or lost during the trip?