A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
Which of the following is a compensating control for providing user access to a high-risk website?
Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?
A company is in the process of cutting jobs to manage costs. The Chief Information Security Officer is concerned about the increased risk of an insider threat. Which of the following would most likely help the security awareness team address this potential threat?
An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?