- (Exam Topic 1)
A security analyst at a technology solutions firm has uncovered the same vulnerabilities on a vulnerability scan for a long period of time. The vulnerabilities are on systems that are dedicated to the firm's largest client. Which of the following is MOST likely inhibiting the remediation efforts?
Correct Answer:
D
- (Exam Topic 3)
Which of the following types of controls defines placing an ACL on a file folder?
Correct Answer:
A
"Technical controls enforce confidentiality, integrity, and availability in the digital space. Examples of technical security controls include firewall rules, access control lists, intrusion prevention systems, and encryption."
- (Exam Topic 3)
A security team has begun updating the risk management plan incident response plan and system security plan to ensure compliance with secunty review guidelines Which of the (olowing can be executed by internal managers to simulate and validate the proposed changes'?
Correct Answer:
B
- (Exam Topic 2)
Which of the following technologies can be used to store digital certificates and is typically used in highsecurity implementations where integrity is paramount?
Correct Answer:
A
- (Exam Topic 2)
A cybersecurity analyst is establishing a threat hunting and intelligence group at a growing organization. Which of the following is a collaborative resource that would MOST likely be used for this purpose?
Correct Answer:
B