1. Right Answer: B
Explanation: The concept of data normalization in which data attributes within a data model are organized to increase the cohesion of entity types.
2. Right Answer: C
Explanation: Risk appetite is not a finding that gets discovered during penetration tests because specific coverage of remediation strategies for six different findings
3. Right Answer: C
Explanation: Of the choices presented, debriefing/closing meeting is the best fit. The -closing meetingΓΒ can often take the form of an After-Action Review (AAR), where the overall timeline of the engagement is analyzed in its entirety. The goal here is to identify key lessons learned, which can be taken to the client organization and used to drive needed changes in its security program.
4. Right Answer: A
Explanation: The best recommended mitigation strategy for encryption (at rest and in transit) is the passwords being stored in plaintext. Storing passwords in plaintext weakens an organization-s security posture through both simplification of lateral movement for a theoretical adversary and the elimination of the concept of non-repudiation and verification of individuals responsible for actions under a given username.
5. Right Answer: B
Explanation: Enforcement of minimum password requirements and preventing users from choosing passwords in common dictionary files would best mitigate the discovery of weak password complexity requirements in a target system or environment.