Which of the following sources could the architect consult to address this security concern?

A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks. Which of the following sources could...

May 6, 2025 No Comments READ MORE +

Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?

After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used. Which of the following would BEST secure the routes while allowing the network to function in the event of a...

May 6, 2025 No Comments READ MORE +

Which of the following is the MOST likely cause of the customer’s inability to connect?

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite: Which of the following is the MOST likely cause of the customer’s inability to connect? A. Weak ciphers are being used. B. The...

May 2, 2025 No Comments READ MORE +

Which of the following should be implemented to reduce the risk to an acceptable level until the issue can be fixed?

A high-severity vulnerability was found on a web application and introduced to the enterprise. The vulnerability could allow an unauthorized user to utilize an open-source library to view privileged user information. The enterprise is unwilling to accept the risk, but the developers cannot fix the issue right away. Which of...

April 30, 2025 No Comments READ MORE +

Which of the following solutions should the security team implement to mitigate the risk of data loss?

An organization is considering a BYOD standard to support remote working. The first iteration of the solution will utilize only approved collaboration applications and the ability to move corporate data between those applications. The security team has concerns about the following: Unstructured data being exfiltrated after an employee leaves the...

April 29, 2025 No Comments READ MORE +

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?

Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...

April 29, 2025 No Comments READ MORE +

Which of the following techniques will MOST likely meet the business’s needs?

A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells. Which of the following techniques will MOST likely meet the business’s needs?A . Performing deep-packet inspection of all digital audio filesB . Adding identifying filesystem metadata to the digital audio filesC ....

April 29, 2025 No Comments READ MORE +

Which of the following would provide the BEST boot loader protection?

A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots. Which of the following would provide the BEST boot loader protection?A ....

April 29, 2025 No Comments READ MORE +

Based on the output above, from which of the following process IDs can the analyst begin an investigation?

A security analyst is concerned that a malicious piece of code was downloaded on a Linux system. After some research, the analyst determines that the suspected piece of code is performing a lot of input/output (I/O) on the disk drive. Based on the output above, from which of the following...

April 28, 2025 No Comments READ MORE +

Which of the following does the business’s IT manager need to consider?

A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business’s IT manager need to consider?A . The availability of personal dataB . The right to personal data erasureC . The company’s annual...

April 28, 2025 No Comments READ MORE +