Question 231

The chief Security Officer (CSO) has reported a rise in data loss but no break ins have occurred. By doing which of the following is the CSO most likely to reduce the number of incidents?
  • Question 232

    Legal authorities notify a company that its network has been compromised for the second time in two years.
    The investigation shows the attackers were able to use the same vulnerability on different systems in both attacks.
    Which of the following would have allowed the security team to use historical information to protect against the second attack?
  • Question 233

    An attack has occurred against a company.
    INSTRUCTIONS
    You have been tasked to do the following:
    Identify the type of attack that is occurring on the network by clicking on the attacker's tablet and reviewing the output. (Answer Area 1) Identify which compensating controls should be implemented on the assets, in order to reduce the effectiveness of future attacks by dragging them to the correct server. (Answer area 2) All objects will be used, but not all placeholders may be filled. Objects may only be used once.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


    Question 234

    A user from the financial aid office is having trouble interacting with the finaid directory on the university's ERP system. The systems administrator who took the call ran a command and received the following output:

    Subsequently, the systems administrator has also confirmed the user is a member of the finaid group on the ERP system.
    Which of the following is the MOST likely reason for the issue?
  • Question 235

    Two companies need to exchange a large number of confidential files Both companies run high availability UTM devices They do not want to use email systems to exchange the data Since the data needs to be exchanged m both directions, which of the following solutions should a security analyst recommend7