Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

During which incident response phase is the incident management team activated?

A.

Recovery

B.

Containment

C.

Eradication

D.

Identification

Which of the following BEST characterizes security mechanisms for mobile devices?

A.

Easy to control through mobile device management

B.

Comparatively weak relative to workstations

C.

Inadequate for organizational use

D.

Configurable and reliable across device types

Which of the following features of an anti-malware application is MOST helpful in protecting an organization from the potential of infected computers using a virtual private network (VPN)?

A.

Data heuristics

B.

On-demand scanning

C.

Endpoint remote control

D.

Data packet analysis

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

A.

Malware researchers

B.

Hacktivists

C.

Cybercriminals

D.

Script kiddies

Which of the following is MOST likely to result in unidentified cybersecurity risks?

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?

A.

The mobile device may be subject to remote wipe.

B.

End users are not trained in mobile device management.

C.

The mobile device is not obtained through corporate provisioning.

D.

Privileged access is replicated to the user's own mobile device.

Which of the following is the MOST serious consequence of mobile device loss or theft?

A.

Cost of purchasing replacement devices

B.

Physical damage to devices

C.

Installation of unauthorized applications

D.

Compromise of transient data

Which of the following is EASIEST for a malicious attacker to detect?

A.

Use of insufficient cryptography

B.

Insecure storage of sensitive data

C.

Susceptibility to reverse engineering

D.

Ability to tamper with mobile code