Question 206

A recent security assessment revealed that an actor exploited a vulnerable workstation within an organization and has persisted on the network for several months. The organization realizes the need to reassess Its security.
Strategy for mitigating risks within the perimeter Which of the following solutions would BEST support the organization's strategy?
  • Question 207

    A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?
  • Question 208

    A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan Types would produce the BEST vulnerability scan report?
  • Question 209

    Which of the following is the correct order of volatility from MOST to LEAST volatile?
  • Question 210

    Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?