Question 26

After consulting with the Chief Risk Officer (CRO). A manager decides to acquire cybersecurity insurance for the company.
Which of the following risk management strategies is the manager adopting?
  • Question 27

    Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?
  • Question 28

    A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL:
    http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us
    The analyst then sends an internal user a link to the new website for testing purposes, and when theuser clicks the link, the analyst is able to browse the website with the following URL:
    http://dev-site.comptia.org/home/show.php?sessionID=98988475
    Which of the following application attacks is being tested?
  • Question 29

    During an incident, an EDR system detects an increase in the number of encrypted outbound connections from multiple hosts. A firewall is also reporting an increase in outbound connections that use random high ports. An analyst plans to review the correlated logs to find the source of the incident. Which of the following tools will BEST assist the analyst?
  • Question 30

    A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS.
    Which of the following must be part of the security architecture to achieve AAA? (Select TWO)