Cybersecurity Management II C795 (100% correct answers)
A company's main asset is a physical working prototype stored in the research and development department. The prototype is not currently connected to the company's network. Which privileged user activity should be monitored? a. Accessing camera logs b. Adding accounts to the administrator group c. Running scripts in PowerShell d. Disabling host firewall correct answers a A company performs a data audit on its critical information every six months. Company policy states that the audit cannot be conducted by the same employee within a two-year time frame. Which principle is this company following? a. Job rotation b. Two person control c. Least privilege d. Need to know correct answers a A user is granted access to restricted and classified information but is supplied only with the information for a current assignment. Which type of authorization mechanism is being applied in this scenario? a. Need to know b. Constrained interface c. Duty separation d Access control list correct answers a Which two data recovery components will back up a file and change the archive bit to 0? Choose 2 answers. a. Full backup b. Differential backup c. Incremental backup d. Copy backup correct answers a, c A company wants to monitor the inbound and outbound flow of packets and not the content. Which defense-in-depth strategy should be implemented? a. The organization should use egress filtering on the network.
École, étude et sujet
- Établissement
- Cybersecurity Management
- Cours
- Cybersecurity Management
Infos sur le Document
- Publié le
- 22 avril 2023
- Nombre de pages
- 16
- Écrit en
- 2022/2023
- Type
- Examen
- Contient
- Questions et réponses
Sujets
-
a companys main asset is a physical working prototype stored in the research and development department the prototype is not currently connected to the companys network which privileged us
Document également disponible en groupe