Which of the following account types Is MOST appropriate for this purpose?
A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types Is MOST appropriate for this purpose?A . Service B. Shared C....
Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?
During a recent incident an external attacker was able to exploit an SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?A . Check for any recent SMB CVEs B. Install AV on the affected server C....
Which of the following describes the continuous delivery software development methodology?
Which of the following describes the continuous delivery software development methodology?A . Waterfall B. Spiral C. V-shaped D. AgileView AnswerAnswer: D
Which of the following BEST describes what the administrator is being advised to do?
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?A . Perform a mathematical operation on the passwords that will convert them into umgue stnngs B. Add extra data to the...
Which of the following issues is MOST likely occurring?
A systems administrator reports degraded performance on a virtual server. The administrator increases the virtual memory allocation which improves conditions, but performance degrades again after a few days. The administrator runs an anarysis tool and sees the following output: The administrator terminates the timeAttend.exe observes system performance over the next...
fingerpnnts to ensure they are not sharing tickets The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?
An amusement park is implementing a btomelnc system that validates customers' fingerpnnts to ensure they are not sharing tickets The park's owner values customers above all and would prefer customers' convenience over security For this reason which of the following features should the security team prioritize FIRST?A . Low FAR...
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?
Which of the following is the GREATEST security concern when outsourcing code development to third-party contractors for an internet-facing application?A . Intellectual property theft B. Elevated privileges C. Unknown backdoor D. Quality assuranceView AnswerAnswer: C
Which of the following attacks has MOST likely occurred?
Security analysts are conducting an investigation of an attack that occurred inside the organization’s network. An attacker was able to connect network traffic between workstation throughout the network. The analysts review the following logs: The layer 2 address table has hundred of entries similar to the ones above. Which of...
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?
Which of the following is the MOST relevant security check to be performed before embedding third-parry libraries in developed code?A . Check to see if the third party has resources to create dedicated development and staging environments. B. Verify the number of companies that downloaded the third-party code and the...
Which of the following should the organization consider before implementation?
An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).A . The back-end directory source B. The identity federation protocol C. The hashing method D. The encryption...