While reviewing logs, a security administrator identifies the following code:
Which of the following best describes the vulnerability being exploited?
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
Retention policies dictate how long data must be stored to comply with local and international regulations. Non-compliance can result in legal and financial penalties. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Data Retention and Legal Requirements'.
A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
Time-of-day restrictions limit access to corporate systems based on predefined schedules. This ensures employees can only access resources during their assigned work hours. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 3: Security Architecture, Section: 'Access Control Models'.
A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?
Smishing is a type of phishing attack that uses SMS text messages to deceive recipients into taking actions such as revealing sensitive information. The urgency in the text indicates this vector. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 2: Threats, Section: 'Social Engineering Techniques'.
A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?
Avoidance involves choosing not to engage in activities or markets where certain risks are present. This is a proactive approach to risk management. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Risk Management Strategies'.
Vanna
4 days agoTu
6 days agoValentin
18 days agoNaulen
1 months agoPrecious
1 months agoYolande
1 months agoSue
2 months agoMarjory
2 months agoNoel
2 months agoFiliberto
2 months agoAlesia
3 months agoHassie
3 months agoTresa
3 months agoLilli
3 months agoCherelle
4 months agoKaran
4 months agoCelestina
4 months agoAlton
4 months agoTamie
4 months agoCraig
5 months agoDorthy
5 months agoVenita
5 months agoKaran
5 months agoJesusita
5 months agoNathalie
6 months agoLelia
6 months agoBettina
6 months agoElfriede
6 months agoFernanda
7 months agoAshlyn
7 months agoMarget
7 months agoLaurel
8 months agoLera
9 months agoLorenza
9 months agoParis
9 months agoPura
9 months agoAriel
10 months agoJoye
10 months agoKeech
10 months agoMark james
10 months agoBrook
10 months agoHelina
10 months agoMark james
10 months agoChauncey
11 months agojohnes
11 months ago