Question 71

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity of a new vendor?
  • Question 72

    Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
  • Question 73

    A user contacts the help desk to report the following:
    Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested.
    The user was able to access the Internet but had trouble accessing the department share until the next day.
    The user is now getting notifications from the bank about unauthorized transactions.
    Which of the following attack vectors was MOST likely used in this scenario?
  • Question 74

    A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
  • Question 75

    Which of the following policies would help an organization identify and mitigate potential single points of failure in the company's IT/security operations?