Workload, application, and data security are critical for protecting:
Workload, application, and data security are critical for protecting:A . Physical devices onlyB . The perimeter networkC . Resources in cloud and on-premises environmentsD . User identitiesView AnswerAnswer: C
Configuring user and device trust using SAML authentication for a mobile or web application helps to:
Configuring user and device trust using SAML authentication for a mobile or web application helps to:A . Reduce application performanceB . Ensure only authorized users and devices can access the applicationC . Increase the number of user accounts requiredD . Disable multifactor authenticationView AnswerAnswer: B
The process of analyzing telemetry reports helps in:
The process of analyzing telemetry reports helps in:A . Determining the scope and impact of a security threatB . Ignoring critical security alertsC . Reducing the efficiency of security operationsD . Focusing solely on external threatsView AnswerAnswer: A
The SAFE architectural framework's Key structure is beneficial for:
The SAFE architectural framework's Key structure is beneficial for:A . Only specifying the types of security devices to be usedB . Providing a holistic view of network security based on specific areas and domainsC . Limiting the security focus to user authenticationD . Designing network topologiesView AnswerAnswer: B
When determining security policies for application enforcement, which of the following is a key consideration?
When determining security policies for application enforcement, which of the following is a key consideration?A . The popularity of the application among usersB . The sensitivity of the data being accessed or stored by the applicationC . The color scheme of the application interfaceD . The programming language used to...
Security audit reports are crucial for:
Security audit reports are crucial for:A . Eliminating the need for security policiesB . Promoting a false sense of securityC . Reducing the overall security budgetD . Identifying compliance gaps and areas lacking sufficient security controlsView AnswerAnswer: D
To allow users a seamless and secure login experience across multiple applications, many organizations configure _________ using an identity provider connection.
To allow users a seamless and secure login experience across multiple applications, many organizations configure _________ using an identity provider connection.A . VPNsB . firewallsC . SAML/SSOD . antivirus softwareView AnswerAnswer: C
Zero-trust network access is based on the principle of:
Zero-trust network access is based on the principle of:A . Trusting all devices inside the networkB . Never verifying user or device identityC . Using traditional perimeter-based security modelsD . Trusting no one and verifying everythingView AnswerAnswer: D
Which of the following are core components of the MITRE ATT&CK framework?
Which of the following are core components of the MITRE ATT&CK framework? (Multiple Correct Answers)A . TTPs (Tactics, Techniques, and Procedures)B . SSL CertificatesC . Defense evasion techniquesD . Credential access methodsView AnswerAnswer: ACD
Cloud (hybrid and multicloud) platform security policies should consider:
Cloud (hybrid and multicloud) platform security policies should consider:A . The physical location of servers onlyB . The specific security features and controls offered by third-party providersC . Ignoring encryption to enhance performanceD . Using a single cloud provider for all needsView AnswerAnswer: B