Which security principle requires more than one person is required to perform a critical task?
Correct Answer:
C
What is a purpose of a vulnerability management framework?
Correct Answer:
A
A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
Correct Answer:
C
An employee reports that someone has logged into their system and made unapproved changes, files are out of order, and several documents have been placed in the recycle bin. The security specialist reviewed the system logs, found nothing suspicious, and was not able to determine what occurred. The software is up to date; there are no alerts from antivirus and no failed login attempts. What is causing the lack of data visibility needed to detect the attack?
Correct Answer:
C
Which technology prevents end-device to end-device IP traceability?
Correct Answer:
C