Question 36

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?
  • Question 37

    A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?
  • Question 38

    An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. Which of the following is the most likely reason for the new requirement?
  • Question 39

    Which of the following are the best security controls for controlling on-premises access? (Select two.)
  • Question 40

    An incident analyst finds several image files on a hard disk. The image files may contain geolocation coordinates. Which of the following best describes the type of information the analyst is trying to extract from the image files?