A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?
Smishing is a type of phishing attack that uses SMS text messages to deceive recipients into taking actions such as revealing sensitive information. The urgency in the text indicates this vector. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 2: Threats, Section: 'Social Engineering Techniques'.
A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?
Avoidance involves choosing not to engage in activities or markets where certain risks are present. This is a proactive approach to risk management. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Risk Management Strategies'.
A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?
Privileged Access Management (PAM) solutions enhance security by enforcing strong authentication, rotation of credentials, and access control for shared accounts. This is especially critical in scenarios like SSO failures. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Privileged Access and Identity Management'.
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
Due diligence refers to the process of researching and understanding the laws, regulations, and best practices that govern information security within a specific industry. Organizations are required to conduct due diligence to ensure compliance with legal and regulatory requirements, which helps mitigate risks and avoid penalties.
Compliance reporting involves generating reports to demonstrate adherence to legal or regulatory standards.
GDPR is a specific regulation governing data privacy in the EU, not a general practice of researching laws.
Attestation is a formal declaration that an organization is compliant with a set of standards but is not the act of researching the laws.
Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?
Cross-site scripting (XSS) vulnerabilities allow attackers to inject malicious scripts into a website, which are then executed in the user's web browser, potentially leading to data theft or session hijacking.
Marjory
3 days agoNoel
6 days agoFiliberto
10 days agoAlesia
17 days agoHassie
1 months agoTresa
1 months agoLilli
1 months agoCherelle
2 months agoKaran
2 months agoCelestina
2 months agoAlton
2 months agoTamie
2 months agoCraig
3 months agoDorthy
3 months agoVenita
3 months agoKaran
3 months agoJesusita
3 months agoNathalie
4 months agoLelia
4 months agoBettina
4 months agoElfriede
4 months agoFernanda
5 months agoAshlyn
5 months agoMarget
5 months agoLaurel
6 months agoLera
7 months agoLorenza
7 months agoParis
7 months agoPura
7 months agoAriel
8 months agoJoye
8 months agoKeech
8 months agoMark james
8 months agoBrook
8 months agoHelina
8 months agoMark james
8 months agoChauncey
9 months agojohnes
9 months ago