Question.66 A networking team asked a security administrator to enable Flash on its web browser. The networking team explained that an important legacy embedded system gathers SNMP information from various devices. The system can only be managed through a web browser running Flash. The embedded system will be replaced within the year but is still critical at the moment. Which of the following should the security administrator do to mitigate the risk? (A) Explain to the networking team the reason Flash is no longer available and insist the team move up the timetable for replacement. (B) Air gap the legacy system from the network and dedicate a laptop with an end-of-life OS on it to connect to the system via crossover cable for management. (C) Suggest that the networking team contact the original embedded system’s vendor to get an update to the system that does not require Flash. (D) Isolate the management interface to a private VLAN where a legacy browser in a VM can be used as needed to manage the system. |
66. Click here to View Answer
Answer: D
Question.67 An organizations threat team is creating a model based on a number of incidents in which systems in an air-gapped location are compromised. Physical access to the location and logical access to the systems are limited to administrators and select, approved, on-site company employees. Which of the following is the BEST strategy to reduce the risks of data exposure? (A) NDAs (B) Mandatory access control (C) NIPS (D) Security awareness training |
67. Click here to View Answer
Answer: B
Question.68 An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity? (A) Deploy a SOAR tool. (B) Modify user password history and length requirements. (C) Apply new isolation and segmentation schemes. (D) Implement decoy files on adjacent hosts. |
68. Click here to View Answer
Answer: D
Question.69 An auditor needs to scan documents at rest for sensitive text. These documents contain both text and images. Which of the following software functionalities must be enabled in the DLP solution for the auditor to be able to fully read these documents? (Choose two.) (A) Document interpolation (B) Regular expression pattern matching (C) Optical character recognition functionality (D) Baseline image matching (E) Advanced rasterization (F) Watermarking |
69. Click here to View Answer
Answer: BC
Question.70 Company A acquired Company . During an audit, a security engineer found Company B’s environment was inadequately patched. In response, Company A placed a firewall between the two environments until Company B’s infrastructure could be integrated into Company A’s security program. Which of the following risk-handling techniques was used? (A) Accept (B) Avoid (C) Transfer (D) Mitigate |
70. Click here to View Answer
Answer: D