1. The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor corporate publicity. The network is mostly flat,with split staff/guest wireless functionality. Which of the following equipment MUST be deployed to guard against unknown threats?
A) Cloud-based antivirus solution,running as local admin,with push technology for definition updates B) Host-based heuristic IPS,segregated on a management VLAN,with direct control of the perimeter firewall ACLs C) Implementation of an off-site datacenter hosting all company data,as well as deployment of VDI for all client computing needs D) Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed
2. Which of the following allows an auditor to test proprietary-software compiled code for security flaws?
A) Code signing B) Static review C) Fuzzing D) Regression testing
3. Which of the following access management concepts is MOST closely associated with the use of a password or PIN??
A) Authorization B) Accounting C) Identification D) Authentication
4. When considering a third-party cloud service provider,which of the following criteria would be the BEST to include in the security assessment process? (Select two.)(Select 2answers)
A) Data retention policies B) Use of performance analytics C) Adherence to regulatory compliance D) Breadth of applications support E) Size of the corporation
5. When attempting to secure a mobile workstation,which of the following authentication technologies rely on the user's physical characteristics? (Select TWO)(Select 2answers)
A) Fingerprint scan B) Password string C) Retina scan D) CAPTCHA E) MAC address table F) Two-factor authentication
Leave a comment