Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
Retention policies dictate how long data must be stored to comply with local and international regulations. Non-compliance can result in legal and financial penalties. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Data Retention and Legal Requirements'.
A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
Time-of-day restrictions limit access to corporate systems based on predefined schedules. This ensures employees can only access resources during their assigned work hours. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 3: Security Architecture, Section: 'Access Control Models'.
A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?
Smishing is a type of phishing attack that uses SMS text messages to deceive recipients into taking actions such as revealing sensitive information. The urgency in the text indicates this vector. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 2: Threats, Section: 'Social Engineering Techniques'.
A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?
Avoidance involves choosing not to engage in activities or markets where certain risks are present. This is a proactive approach to risk management. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Risk Management Strategies'.
A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?
Privileged Access Management (PAM) solutions enhance security by enforcing strong authentication, rotation of credentials, and access control for shared accounts. This is especially critical in scenarios like SSO failures. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Privileged Access and Identity Management'.
Naulen
11 days agoPrecious
14 days agoYolande
15 days agoSue
28 days agoMarjory
1 months agoNoel
1 months agoFiliberto
2 months agoAlesia
2 months agoHassie
2 months agoTresa
2 months agoLilli
2 months agoCherelle
3 months agoKaran
3 months agoCelestina
3 months agoAlton
3 months agoTamie
3 months agoCraig
4 months agoDorthy
4 months agoVenita
4 months agoKaran
5 months agoJesusita
5 months agoNathalie
5 months agoLelia
5 months agoBettina
5 months agoElfriede
5 months agoFernanda
6 months agoAshlyn
6 months agoMarget
6 months agoLaurel
8 months agoLera
8 months agoLorenza
8 months agoParis
9 months agoPura
9 months agoAriel
9 months agoJoye
10 months agoKeech
10 months agoMark james
10 months agoBrook
10 months agoHelina
10 months agoMark james
10 months agoChauncey
10 months agojohnes
10 months ago