Topic 1: Exam Pool A
Which of the following is essential for getting full security value from your system baseline?
Response:
A.
Capturing and storing an image of the baseline
B.
Keeping a copy of upcoming suggested modifications to the baseline
C.
Having the baseline vetted by an objective third party
D.
Using a baseline from another industry member so as not to engage in repetitious efforts
Capturing and storing an image of the baseline
A typical DLP tool can enhance the organization’s efforts at accomplishing what legal task?
Response:
A.
Evidence collection
B.
Delivering testimony
C.
Criminal prosecution
D.
Enforcement of intellectual property rights
Evidence collection
____________ can often be the result of inadvertent activity.
Response:
A.
DDoS
B.
Phishing
C.
Sprawl
D.
Disasters
Sprawl
Who is ultimately responsible for a data breach that includes personally identifiable
information (PII), in the event of negligence on the part of the cloud provider?
A.
The user
B.
The subject
C.
The cloud provider
D.
The cloud customer
The cloud customer
Which of the following practices can enhance both operational capabilities and
configuration management efforts?
Response:
A.
Regular backups
B.
Constant uptime
C.
Multifactor authentication
D.
File hashes
File hashes
Page 7 out of 103 Pages |
Previous |