Question 206

Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
  • Question 207

    The process of passively gathering information prior to launching a cyberattack is called:
  • Question 208

    A security engineer needs to enhance MFA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?
  • Question 209

    A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
    INSTRUCTIONS
    Click on each firewall to do the following:
    Deny cleartext web traffic.
    Ensure secure management protocols are used.Resolve issues at the DR site.
    The ruleset order cannot be modified due to outside constraints.
    If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


    Question 210

    In which of the following situations would it be BEST to use a detective control type for mitigation?