- (Exam Topic 5)
Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
Correct Answer:
AB
- (Exam Topic 3)
Accompany has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?
Correct Answer:
A
- (Exam Topic 6)
Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?
Correct Answer:
A
- (Exam Topic 3)
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?
Correct Answer:
C
- (Exam Topic 3)
Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs initiating this traffic. Which of the following attacks is MOST likely occurring?
Correct Answer:
A