Question 196

Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?
  • Question 197

    An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?
  • Question 198

    Which of the following would be the BEST resource lor a software developer who is looking to improve secure coding practices for web applications?
  • Question 199

    Which of the following relets to applications and systems that are used within an organization without consent or approval?
  • Question 200

    A company needs to validate its updated incident response plan using a real-world scenario that will test decision points and relevant incident response actions without interrupting daily operations. Which of the following would BEST meet the company's requirements?