Which of the following vulnerabilities is associated with installing software outside of a manufacturers approved software repository?
D
Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?
A
Which of the following security concepts is accomplished with the installation of a RADIUS server?
B
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?
C
Which of the following enables the use of an input field to run commands that can view or manipulate data?
D
Which of the following phases of an incident response involves generating reports?
C
A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?
D
A newly identified network access vulnerability has been found in the OS of legacy IoT devices. Which of the following would best mitigate this vulnerability quickly?
C
A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?
B
A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems. Which of the following strategies should the company use to achieve this security requirement?
B