Question 46
Which of the following scenarios BEST describes a risk reduction technique?
Question 47
Which biometric error would allow an unauthorized user to access a system?
Question 48
A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization's security posture?
Question 49
An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?
Question 50
A company labeled some documents with the public sensitivity classification. This means the documents can be accessed by: