Question 6 of 860

An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?

    Correct Answer: C

    To address the Chief Privacy Officer's requirement to remove personally identifiable information (PII) while ensuring the development team can perform realistic functionality tests and search for specific data, implementing data masking is the best choice. Data masking obscures sensitive data by substituting it with fictional yet structurally and contextually similar data, thus preserving the usability of the data for testing purposes without exposing actual PII. This approach effectively balances the need for data privacy with the necessity for realistic testing environments.

Question 7 of 860

A company is implementing a DLP solution on the file server. The file server has PII, financial information, and health information stored on it. Depending on what type of data that is hosted on the file server, the company wants different DLP rules assigned to the data. Which of the following should the company do to help accomplish this goal?

    Correct Answer: A

    To implement different Data Loss Prevention (DLP) rules based on the type of data hosted on a file server, the company must classify the data. Data classification involves categorizing and labeling data based on its sensitivity, value, and regulatory requirements. By classifying data into categories such as PII (Personally Identifiable Information), financial information, and health information, the company can create and enforce DLP rules specific to each category. This enables tailored security measures for different types of data, ensuring appropriate protection levels according to the data's sensitivity and compliance requirements.

Question 8 of 860

A forensics investigator is examining a number of unauthorized payments that were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:

Click here to unsubscribe

Which of the following will the forensics investigator MOST likely determine has occurred?

    Correct Answer: D

    The scenario involves users receiving emails with a link purportedly to unsubscribe from a mailing list, but the link actually performs unauthorized actions such as initiating payments. This is indicative of a Cross-Site Request Forgery (XSRF or CSRF) attack, where the attacker tricks users into executing actions they did not intend to perform. The link contains sensitive parameters like routing and account numbers, which suggest a request being sent to a server with the user's unintended authorization. This matches the typical pattern of an XSRF attack, making it the most likely determination by the forensics investigator.

Question 9 of 860

A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?

    Correct Answer: A

    To prevent someone from using exfiltrated credentials, the CISO should implement Multi-Factor Authentication (MFA). While users might choose the same credentials across different systems, MFA provides an additional layer of security beyond just the username and password. Even if an attacker obtains passwords, they would still need the second factor (such as a mobile phone for an OTP, or biometric verification) to gain access. Therefore, implementing MFA would effectively mitigate the risk of unauthorized access using exfiltrated credentials.

Question 10 of 860

A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?

    Correct Answer: B

    A wildcard certificate is best suited for a single domain that has multiple subdomains. This type of certificate simplifies certificate management by allowing the organization to use a single certificate for the main domain and all its subdomains. For example, if the main domain is 'example.com', a wildcard certificate can secure 'blog.example.com', 'shop.example.com', and any other subdomains, thereby reducing administrative efforts and costs associated with managing individual certificates for each subdomain.