- (Exam Topic 5)
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).
Correct Answer:
BC
- (Exam Topic 1)
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?
Correct Answer:
C
- (Exam Topic 4)
A major palitical party experienced a server breach. The hacker then publicly posted stolen intemal cammunications compeming campaign strategies to give the oppasitian party an advantage. Which of the following BEST describes these threat actors?
Correct Answer:
B
- (Exam Topic 5)
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?
Correct Answer:
D
- (Exam Topic 4)
A SOC is implementing an insider-threat-detection program. The primary concern is that users may be accessing confidential data without authorization. Which of the following should be deployed to detect a potential insider threat?
Correct Answer:
A