Which data category can be accessed by any current employee or contractor?
Author: Anonymous
You are a security administrator asked to restrict employees…
You are a security administrator asked to restrict employees in your organization from accessing their social media accounts at their workplace. Which of the following mobile device location-based policies should you use to accomplish this?
Justin works for an automobile manufacturer. The company is…
Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must provide an internet connection as an access point, mirror a smartphone screen on the LED dash display, and have a hands-free system where drivers can use voice controls to browse their phone’s contact list, make and receive hands-free phone calls, and use navigation apps.Which technology should he use and why?
While preparing a continuity plan, you were asked to choose…
While preparing a continuity plan, you were asked to choose a technique by which the backup data stored on the cloud can be accessed from any location. Which of the following techniques should you choose?
Which of the following is an authentication system that uses…
Which of the following is an authentication system that uses UDP over TCP?
Under which vulnerability can an attacker steal information…
Under which vulnerability can an attacker steal information from a user’s phone using a device to connect to the phone without physically touching it?
You are the chief security administrator in your enterprise….
You are the chief security administrator in your enterprise. You are asked to train every employee, from top-level officers to front gate security officers, to make them aware of various security risks. Which of the following training techniques should you use?
Which of the following policies restrict employees from bein…
Which of the following policies restrict employees from being in a position to manipulate security configurations by limiting the time they spend with control of those configurations?
You are a cybersecurity forensic analyst. When conducting an…
You are a cybersecurity forensic analyst. When conducting an investigation, which of the following actions should you perform first to ensure the highest chance of success in the investigation?
Which of the following is a legal complication related to fo…
Which of the following is a legal complication related to forensics that should be considered when creating a cloud platform?