What is the MOST significant benefit of role-based access control (RBAC)?
Answer : D
What is the MOST common security risk of a mobile device?
Answer : B
What level of Redundant Array of Independent Disks (RAID) is configured PRIMARILY for high-performance data reads and writes?
Answer : A
What type of risk is related to the sequences of value-adding and managerial activities undertaken in an organization?
Answer : D
International bodies established a regulatory scheme that defines how weapons are exchanged between the signatories. It also addresses cyber weapons, including malicious software, Command and Control (C2) software, and internet surveillance software. This is a description of which of the following?
Answer : C
An organization has implemented a protection strategy to secure the network from unauthorized external access. The new Chief Information Security Officer
(CISO) wants to increase security by better protecting the network from unauthorized internal access. Which Network Access Control (NAC) capability BEST meets this objective?
Answer : B
Which section of the assessment report addresses separate vulnerabilities, weaknesses, and gaps?
Answer : D
Why is data classification control important to an organization?
Answer : B
To monitor the security of buried data lines inside the perimeter of a facility, which of the following is the MOST effective control?
Answer : C
An enterprise is developing a baseline cybersecurity standard its suppliers must meet before being awarded a contract. Which of the following statements is TRUE about the baseline cybersecurity standard?
Answer : B
Which access control method is based on users issuing access requests on system resources, features assigned to those resources, the operational or situational context, and a set of policies specified in terms of those features and context?
Answer : B
What is a security concern when considering implementing software-defined networking (SDN)?
Answer : B
What is the BEST way to restrict access to a file system on computing systems?
Answer : A
Which of the following is the PRIMARY reason for selecting the appropriate level of detail for audit record generation?
Answer : B
What is the correct order of execution for security architecture?
Answer : C