Question 36

Which of the following tools is effective in preventing a user from accessing unauthorized removable media?
  • Question 37

    The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schem a. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs Which of the following is the BEST solution to meet the requirement?
  • Question 38

    Which of the following terms describes a broad range of information that is sensitive to a specific organization?
  • Question 39

    Which of the following would be indicative of a hidden audio file found inside of a piece of source code?
  • Question 40

    Two organizations plan to collaborate on the evaluation of new SIEM solutions for their respective companies. A combined effort from both organizations' SOC teams would speed up the effort. Which of the following can be written to document this agreement?