A contractor hacked into an unencrypted session on an organization's wireless network. Which authentication configuration is MOST likely to have enabled this?
Which of the following security techniques can be used to ensure the integrity of software as well as determine who developed the software?
For a process that is outside its upper control limit (UCL), which of the following techniques would best be used to return the process under control?
What BEST describes the end goal of a Disaster Recovery (DR) program?
Which of the following is the MOST effective approach to reduce the threat of rogue devices being introduced to the internal network?
A company with stable demand that uses exponential smoothing to forecast demand would typically use a:
An organization has deployed an Identity And Access Management (IAM) tool and is expanding their information governance program. Which of the following would BEST be included in the governance for IAM?
Internet Small Computer Systems Interface (iSCSI) protocol relies on Transmission Control Protocol/Internet Protocol (TCP/IP). Which can be used maliciously to interrupt the flow of data. Which Information Technology (IT) component would be impacted by such a disruption?
Which of the following activities is an example of collaboration between suppliers and operations which would give more lead time visibility?
When conducting a vulnerability test using a scanner tool, which unintended consequence can occur?
An organization wants to implement Zero Trust (ZT). The Information Technology (IT) department is already using Multi-Factor Authentication (MFA) and Identity and Access Management (IAM). Which of the following would be the BEST solution for the organization to implement in order to have a ZT network?
A security engineer is implementing a Supervisory Control and Data Acquisition (SCADA) system.
What is the BEST action the engineer can take to ensure secure operations?
Which of the following describes the 3 MAIN roles of the identity-delegation model?
An organization is concerned that if an employee’s mobile device is lost or stolen and does not reconnect to the carrier network, the data on the device may still be at risk. Consequently, the organization has implemented a control on all mobile devices to require an eight-character passcode for unlock and login. What should happen after multiple incorrect passcode attempts?
Which of the following should recommendations from a Plan Of Action And Milestones (POA&M) be based on?