Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?
Author: Anonymous
You are the chief security administrator in your enterprise….
You are the chief security administrator in your enterprise. You are asked to train every employee, from top-level officers to front gate security officers, to make them aware of various security risks. Which of the following training techniques should you use?
Which of the following policies restrict employees from bein…
Which of the following policies restrict employees from being in a position to manipulate security configurations by limiting the time they spend with control of those configurations?
You are a cybersecurity forensic analyst. When conducting an…
You are a cybersecurity forensic analyst. When conducting an investigation, which of the following actions should you perform first to ensure the highest chance of success in the investigation?
Which of the following is a legal complication related to fo…
Which of the following is a legal complication related to forensics that should be considered when creating a cloud platform?
You are working as a security admin in an enterprise. While…
You are working as a security admin in an enterprise. While you were analyzing different password attacks, you found that whenever an individual user’s password gets cracked, another user with the same password residing in the same password digest file also has their account compromised. How should you prevent this from happening in the future?
Suzanne is a cybersecurity expert. She was approached by Ale…
Suzanne is a cybersecurity expert. She was approached by Alex with a complaint that his payment information has leaked even though he has not made any online payments or shared information with anyone. Suzanne concluded that attackers most likely bumped a portable reader against Alex’s smartphone to make an NFC connection and steal the payment information stored on the phone.What should Suzanne suggest to Alex to prevent this type of attack from happening in the future?
Which of the following authentication methods belongs in the…
Which of the following authentication methods belongs in the “something you have” category?
Which of the following is NOT a method for destroying data s…
Which of the following is NOT a method for destroying data stored on paper media?
How do phishing simulations contribute to enterprise securit…
How do phishing simulations contribute to enterprise security?