Which of the following is the best way to secure an on-site data center against intrusion from an insider?
An organization wants to improve the company's security authentication method for remote employees. Given the following requirements:
• Must work across SaaS and internal network applications
• Must be device manufacturer agnostic
• Must have offline capabilities
Which of the following would be the most appropriate authentication method?
A company's online shopping website became unusable shortly after midnight on January 30, 2023. When a security analyst reviewed the database server, the analyst noticed the following code used for backing up data:
Which of the following should the analyst do next?
Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?
An employee used a company's billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?
Which of the following is the most likely benefit of conducting an internal audit?
A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?
Which of the following should an organization use to protect its environment from external attacks conducted by an unauthorized hacker?
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
Which of the following is a compensating control for providing user access to a high-risk website?
Which of the following describes the maximum allowance of accepted risk?
After a series of account compromises and credential misuse, a company hires a security manager to develop a security program. Which of the following steps should the security manager take first to increase security awareness?
An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?
A systems administrator needs to ensure the secure communication of sensitive data within the organization's private cloud. Which of the following is the best choice for the administrator to implement?
Which of the following security controls would best guard a payroll system against insider manipulation threats?