- (Exam Topic 3)
An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?
Correct Answer:
A
- (Exam Topic 4)
A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. The users must also be protected because many of them work from home or at remote locations, providing on-site customer support. Which of the following should the administrator employ to meet these criteria?
Correct Answer:
B
- (Exam Topic 2)
A news article states hackers have been selling access to IoT camera feeds. Which of the following is the Most likely reason for this issue?
Correct Answer:
B
- (Exam Topic 5)
During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
Correct Answer:
B
- (Exam Topic 3)
An application owner has requested access for an external application to upload data from the central internal website without providing credentials at any point. Which of the following authentication methods should be configured to allow this type of integration access?
Correct Answer:
B