Which of the following BEST sets expectation between the security team and business units within an organization?

Which of the following BEST sets expectation between the security team and business units within an organization?A . Risk assessmentB . Memorandum of understandingC . Business impact analysisD . Business partnership agreementE . Services level agreementView AnswerAnswer: E Explanation: A service level agreement (SLA) is the best option to set...

March 28, 2024 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization.B . Deploy...

March 28, 2024 No Comments READ MORE +

Which of the following will MOST likely be a limiting factor when selecting mobile device managers for the company?

A company that all mobile devices be encrypted, commensurate with the full disk encryption scheme of assets, such as workstation, servers, and laptops. Which of the following will MOST likely be a limiting factor when selecting mobile device managers for the company?A . Increased network latencyB . Unavailable of key...

March 28, 2024 No Comments READ MORE +

Which of the following is MOST likely the root cause?

An application server was recently upgraded to prefer TLS 1.3, and now users are unable to connect their clients to the server. Attempts to reproduce the error are confirmed, and clients are reporting the following: ERR_SSL_VERSION_OR_CIPHER_MISMATCH Which of the following is MOST likely the root cause?A . The client application...

March 28, 2024 No Comments READ MORE +

Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner?

Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs. Which of the following should a security engineer...

March 28, 2024 No Comments READ MORE +

Which of the following is the MOST likely cause of the customer’s inability to connect?

A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite: Which of the following is the MOST likely cause of the customer’s inability to connect? A. Weak ciphers are being used. B. The...

March 27, 2024 No Comments READ MORE +

Which of the following will MOST likely secure the data on the lost device?

A company is migrating from company-owned phones to a BYOD strategy for mobile devices. The pilot program will start with the executive management team and be rolled out to the rest of the staff in phases. The company’s Chief Financial Officer loses a phone multiple times a year. Which of...

March 27, 2024 No Comments READ MORE +

Which of the following would BEST mitigate this type of attack?

A security analyst is reviewing the following output: Which of the following would BEST mitigate this type of attack?A . Installing a network firewallB . Placing a WAF inlineC . Implementing an IDSD . Deploying a honeypotView AnswerAnswer: B Explanation: The output shows a SQL injection attack that is trying...

March 27, 2024 No Comments READ MORE +

Which of the following will allow the inspection of the data without multiple certificate deployments?

A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed. Which of the following will allow the inspection of the data without multiple certificate deployments? A. Include all available cipher suites. B. Create a wildcard certificate....

March 27, 2024 No Comments READ MORE +

Which of the following should the company use to prevent data theft?

A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs. Which of the following should the company use to prevent data theft?A . WatermarkingB . DRMC . NDAD . Access loggingView AnswerAnswer: B Explanation: DRM (digital rights management) is a technology that...

March 26, 2024 No Comments READ MORE +