Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A company filed a complaint with its IT service provider after the company discovered the service provider’s external audit team had access to some of the company’s confidential information. Which of the following is the most likely reason the company filed the complaint? A. The MOU had basic clauses from a template. B. A SOW had not been agreed to by the client. C. A WO had not been mutually approved. D. A required NDA had not been signed. Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO’s report? A. Insider threat B. Hacktivist C. Nation-state D. Organized crime Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take? A. Retain the emails between the security team and affected customers for 30 days. B. Retain any communications related to the security breach until further notice. C. Retain any communications between security members during the breach response. D. Retain all emails from the company to affected customers for an indefinite period of time. Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following technologies must be used in an organization that intends to automate infrastructure deployment? A. IaC B. IaaS C. IoC D. IoT Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following is a security implication of using SDN over traditional methods? A. Network device configuration can be dynamically adjusted to react to a detected security threat. B. Network alerting and reporting is reduced due to lack of integration with analysis tools. C. Network intrusion detection results in increased false positives or false negatives. D. Network infrastructure is outsourced to a third-party vendor better suited to maintaining security. Submit Answer