Topic 3: Exam Pool C
Which of the following types of controls is a CCTV camera that is not being monitored?
A.
Detective
B.
Deterrent
C.
Physical
D.
Preventive
Deterrent
A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet. Which of the following would MOST likely allow the company to find the cause?
A.
Checksums
B.
Watermarks
C.
Oder of volatility
D.
A log analysis
E.
A right-to-audit clause
A log analysis
In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?
A.
Identification
B.
Preparation
C.
Eradiction
D.
Recovery
E.
Containment
Containment
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?
A.
The system was configured with weak default security settings.
B.
The device uses weak encryption ciphers.
C.
The vendor has not supplied a patch for the appliance.
D.
The appliance requires administrative credentials for the assessment
The vendor has not supplied a patch for the appliance.
A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?
A.
Unsecme protocols
B.
Default settings
C.
Open permissions
D.
Weak encryption
Weak encryption
Page 26 out of 178 Pages |
Previous |