The ASD Top Four are application whitelisting, patching of applications, patching of operating systems, and limiting administrative privileges. What percent of breaches do these account for?
Answer & Explanation
Correct Answer: 85 percent
Note: This Question is unanswered, help us to find answer for this one
Proxy servers perform operations on ____-level data.
Answer & Explanation
Correct Answer: Application
Note: This Question is unanswered, help us to find answer for this one
Which malware changes an operating system and conceals its tracks?
Answer & Explanation
Correct Answer: Rootkit
Note: This Question is unanswered, help us to find answer for this one
You have just identified and mitigated an active malware attack on a user's computer, in which command and control was established. What is the next step in the process?
Answer & Explanation
Correct Answer: Eradiction / Remediation
Note: This Question is unanswered, help us to find answer for this one
When implementing a data loss prevention (DLP) strategy, what is the first step in the process?
Answer & Explanation
Correct Answer: Evaluate the features of available DLP products to determine which best meet your organizations's needs.
Note: This Question is unanswered, help us to find answer for this one
The DLP project team is about to classify your organization's data. Whats is the primary purpose of classifying data?
Answer & Explanation
Correct Answer: It quantifies the potential cost of a data breach.
Note: This Question is unanswered, help us to find answer for this one
You organization is conducting a pilot deployment of a new e-commerce application being considered for purchase. You need to recommend a strategy to evaluate the security of the new software. Your organization does not have access to the application's source code. Which strategy should you choose?