Which of the following solutions should the engineer implement?
An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?A . Proxy server B. WAF C. Load balancer D. VPNView AnswerAnswer: B
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?A . Common Weakness Enumeration B. OSINT C. Dark web D. Vulnerability databasesView AnswerAnswer: C
Which of the following would mitigate the manager's concerns?
A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?A . Implement a full system...
Which of the following can be used to accomplish this task?
An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?A . Application allow list B. SWG C. Host-based firewall D. VPNView AnswerAnswer: B
Which of the following concepts does this message describe?
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?A...
Which of the following should the systems engineer consider?
An organization is building backup server rooms in geographically diverse locations The Chief Information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing server room. Which of the following should the systems engineer consider?A . Purchasing...
Which of the following would BEST meet the requirements?
A security analyst is designing the appropnate controls to limit unauthorized access to a physical site. The analyst has a directive to utilize the lowest possible budget. Which of the following would BEST meet the requirements?A . Preventive controls B. Compensating controls C. Deterrent controls D. Detective controlsView AnswerAnswer: C...
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?
Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?A . CVSS B. SIEM C. SOAR D. CVEView AnswerAnswer: A Explanation: CVSS is maintained by the Forum of Incident Response and Security Teams (first.org/cvss). CVSS metrics generate a score from 0 to 10...
Which of the following technologies meets the requirement?
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?A . SSO B. IDS C. MFA D. TPMView AnswerAnswer: C
Which of the following does this process BEST protect?
A technician enables full disk encryption on a laptop that will be taken on a business tnp. Which of the following does this process BEST protect?A . Data in transit B. Data in processing C. Data at rest D. Data tokenizationView AnswerAnswer: C Explanation: Data at rest: Data at rest...