Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the role of the compiler?

A.

To take the most recent line of code, translate it, and execute the machine code

B.

To create an executable program by translating all of the code at one time

C.

To run scripting languages to test one line of code at a time

D.

To create executable code that is compatible with different operating systems

When is it better to purchase software rather than build a software solution in-house?

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

An on-call security engineer has been notified after business hours that a possible threat could be impacting production applications.

Which type of threat intelligence should be used by first responders?

A.

Tactical

B.

Commodity malware

C.

Operational

D.

Strategic

An employee needs to execute a program from the command line.

Which peripheral device should be used?

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

A system analyst is reviewing risk documents and noticed that the date of many risks are more than three years old.

What should be proposed to leadership regarding these risks?

A.

A process to reassess risks on a defined schedule

B.

A process to confirm that risk documents are readily available to all individuals

C.

A process to evaluate how risks are captured on risk documents

D.

A process to determine how involved leadership is in assignment risk scores

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

Which type of communications media uses light waves to transmit data?

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

What is the best solution?

A.

File integrity monitoring (FIM)

B.

Data loss prevention (DLP)

C.

Intrusion detection system (IDS)

D.

Security information and event management (SIEM)

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all network devices

B.

Conducting regular vulnerability scans to identify potential weaknesses

C.

Implementing intrusion detection and prevention systems (IDPS)

D.

Removing all end-of-life devices from the network