Which of the following measures would best protect an organization from automated attacks whereby the attacker attempts to identify weak or leaked passwords in order to log into employees' accounts?
Answer : B
Which of the following attributes of data are cybersecurity controls primarily designed to protect?
Answer : C
Which of the following characteristics applies to an organization that adopts a flat structure?
Answer : D
Which of the following is most influenced by a retained earnings policy?
Answer : D
Management is designing its disaster recovery plan. In the event that there is significant damage to the organization's IT systems this plan should enable the organization to resume operations at a recovery site after some configuration and data restoration. Which of the following is the ideal solution for management in this scenario?
Answer : A
A newly appointed board member received an email that appeared to be from the company's CEO. The email stated:
''Good morning. As you remember, the closure of projects is our top priority. Kindly organize prompt payment of the attached invoice for our new solar energy partners.'' The board member quickly replied to the email and asked under which project the expense should be accounted. Only then did he realize that the sender 's mail domain was different from the company's. Which of the following cybersecurity risks nearly occurred in the situation described?
Answer : A
Which of the following is an effective preventive control for data center security?
Answer : B