Question: 1
Which of the following would BEST protect a network from a worm that exploits a publicly announced operating system vulnerability?
Question: 2
An external attacker spoofing an internal Internet protocol (IP) address can BEST be detected by which of the following?
Question: 3
Which of the following is MOST important to have in place before developing a disaster recovery plan (DRP)?
Question: 4
Using development and operations (DevOps) processes an organization's IT department has automated the process of replacing application programming interlaces (APIs) m production with new versions. Which of the following controls would BEST reduce the risk of vulnerabilities in this situation?
Question: 5
Which of the Which is the MOST effective control to reduce the risk of information leakage through social media'?