What does the following SQL statement produce when executed?
SELECT ‘ FROM Customers
WHERE State = 'Arizona';
Why should an information technology (IT) professional be aware of professional associations?
Which risk management strategy will help prevent cheating using a learning management system as a platform?
Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?
A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.
Which type of risk response should the healthcare provider use?
A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.
What is the first step in the risk management life cycle in this scenario?
An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.
What is the best solution?
What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?
An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.
Which solution should be implemented to meet the requirements?
Which life cycle is part of the process for planning, creating, testing, and deploying information systems?
A government agency needs to deploy a secure network connection between its offices in Chicago and New York.
What should be used to facilitate this connection?
An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.
Which type of encryption will meet the needs of the organization?
An IT organization has seen a surge of ransomware and Trojan horse attacks recently.
Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?
Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?
A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.
Which security technology meets the needs of this company?
Which risk management strategy will secure an application from potential malware and advanced persistent threats?
How does application software differ from operating systems?
Choose 2 answers
A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.
What is the most important factor to consider when evaluating the severity of the ransomware attack?
A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which technique will prevent unauthorized modifications to the BIOS firmware on a server?
Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?
Match the legislative purpose with the corresponding legislation.
Answer options may be used more than once or not at all.
A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.
Which step will ensure the effectiveness of the DRP?
A small online retailer stores customer information, product inventory, and financial data on its local servers.
What are the necessary components of a business continuity and disaster recovery plan for this company?
What allows a user to query information from an online database with a web application without revealing what they are viewing?
Which item information should be stored in a database to determine an order total?
The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.
Which type of file should the analyst use to inspect the traffic?
An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.
Which strategy should be used to enable identity federation in this scenario?
Which two benefits do computer networks provide for businesses?
Choose 2 answers
A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.
Which risk mitigation strategy will meet the needs of the company?
The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.
Which solution fulfills these requirements?
A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.
What is the best solution?
An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.
Which strategy should the agency implement?
Which system conversion method deploys the new system while the old system is still operational in order to compare output?
Which technique allows someone to obtain a password while it is in transit?
Which IT role is responsible for installing new hardware and troubleshooting existing hardware?
A security team has been informed that user data on the network has been compromised.
What is the first step the organization should take to respond to this data breach?
During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.
Which action should be taken to resolve the issue?
Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?