Question 26

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
  • Question 27

    A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL:
    http://dev-site.comptia.org/home/show.php?sessionID=77276554
    The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL:
    http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us
    Which of the following application attacks is being tested?
  • Question 28

    A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution but instead wants to rely on the authorization provided by another platform.
    Which of the following is the BEST approach to implement the desired solution?
  • Question 29

    A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log:

    Which of the following can the security analyst conclude?
  • Question 30

    An organization recently recovered from a data breach. During the root cause analysis, the organization determined the source of the breach to be a personal cell phone that had been reported lost. Which of the following
    solutions should the organization implement to reduce the likelihood of future data breaches?