Which of the following would most likely improve the security of employee data

Show

After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult to determine a priority list for forensic review?

Answer :

  • The vulnerability scan output

A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two-drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?

The IT departmentג€™s on-site developer has been with the team for many years. Once an application is released, the security team can identify multiple vulnerabilities. Which would best help the team ensure the application is ready to be released to production?

Answer :

  • Submit the application to QA before releasing it

An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence and preserve the admissibility of the evidence, which of the following forensic techniques should be used?

Answer :

  • Chain of custody

A security analyst is performing a forensic investigation involving compromised account credentials. Using the Event Viewer, the analyst could detect the following message: ג€Special privileges assigned to the new logon.ג€ Several of these messages did not have a valid login associated with the user before these privileges were assigned. Which of the following attacks is most likely being detected?

A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the most secure? (Select two)

Answer :

  • Password and smart card
  • Password and fingerprint

The process of passively gathering information poor to launching a cyberattack is called:

Which of the following best describes an important security advantage yielded by implementing vendor diversity?

Which of the following backup techniques is the most appropriate when an organization requires extremely granular data restore points, as defined in the recovery point objective?

Answer :

  • Continuous data backup

An employee who has access to highly confidential information has resigned. Upon departure, which of the following should be done first?

Answer :

  • Revoke the employee’s access to all systems

Which of the following controls would best help protect an organization from successful phishing attacks?

Answer :

  • Employee awareness training

Which of the following would most likely be considered a conflict of interest for an IS auditor who is reviewing a cybersecurity implementation?

Answer :

  • Designing the cybersecurity controls

An IS auditor is reviewing an organization’s business continuity plan. Which of the following would provide the best means of evaluating the systems supporting the organization’s critical processes?

Answer :

  • Business impact analysis

An enterprise has selected a vendor to develop and implement a new software system. To ensure that the enterprise’s investment in software is protected, which of the following security clauses is most important to include in the master services agreement?

Which of the following is the most effective control when granting temporary access to vendors?

Answer :

  • User accounts are created with expiration dates and are based on services provided

Which of the following business continuity activities is primarily the responsibility of the IT department?

Answer :

  • Restoring systems and data after a business disruption

Which of the following ensures the availability of transactions in the event of a disaster?

Answer :

  • Transmit transactions offsite in real-time

The management of an organization has decided to establish a security awareness program. Which of the following would most likely be a part of the program?

Answer :

  • Training provided on a regular basis to all current and new employees

Which of the following is the most effective source of new employees quizlet?

The most effective sources of new employee sources are job postings on websites.

Which term refers to paying continuous attention to workforce planning issues?

Paying continuous attention to workforce planning issues is called predictive workforce monitoring.

What are the three tools that small businesses can use to improve their HR management practices?

To summarize, by using the following tools, your HR reps will have everything they need to navigate the complexities of managing your employees:.
Applicant Tracking System (ATS).
Performance Management Software..
Payroll Software Solutions..
Employee Onboarding Software..
HR Reporting Software..
Employee Database Software..

Which of the following questions is most likely answered by a job specifications?

The correct option is: B) What types of skills and experiences are required for this job? Explanation: Job specification explains the skills and experience requires for performing a job.