Question 41

Which of the following risk management strategies would an organization use to maintain a legacy system with known risks for operational purposes?
  • Question 42

    A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?
  • Question 43

    Which of the following terms describes a broad range of information that is sensitive to a specific organization?
  • Question 44

    A penetration tester was able to compromise an internal server and is now trying to pivot the current session in a network lateral movement Which of the following tools if available on the server, will provide the MOST useful information for the next assessment step?
  • Question 45

    Which of the following is the MOST effective control against zero-day vulnerabilities?