Question 1
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?
Question 2
An employee received a word processing file that was delivered as an email attachment The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?
Question 3
An audit Identified Pll being utilized In the development environment of a critical application. The Chief Privacy Officer (CPO) Is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific dat a. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Question 4
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
Question 5
Which of the following is assured when a user signs an email using a private key?