An analyst is responding 10 an incident involving an attack on a company -owned mobile device that was being used by an employee to collect data from clients in the held. Maiware was loaded on the device via the installation of a third -party software package The analyst has baselined the device Which of the following should the analyst do to BEST mitigate future attacks?
Some hard disks need to be taken as evidence for further analysis during an incident response Which of the following procedures must be completed FIRST for this type of evtdertce acquisition?
Which of the following is the software development process by which function, usability, and scenarios are tested against a known set of base requirements?
An organization wants to ensure the privacy of the data that is on its systems Full disk encryption and DLP are already in use Which of the following is the BEST option?
A company wants to configure the environment to allow passive network monitonng. To avoid disrupting the sensitive network, which of the following must be supported by the scanner's NIC to assist with the company's request?
Due to a nse m cyberattackers seeking PHI, a healthcare company that collects highly sensitive data from millions of customers is deploying a solution that will ensure the customers' data is protected by the organization internally and externally Which of the following countermeasures can BEST prevent the loss of customers' sensitive data?