Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?

A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment. Which of the...

May 25, 2023 No Comments READ MORE +

Which of the following should the security engineer do to ensure IMAPS functions properly on the corporate user network?

A security engineer has been asked to close all non-secure connections from the corporate network. The engineer is attempting to understand why the corporate UTM will not allow users to download email via IMAPS. The engineer formulates a theory and begins testing by creating the firewall ID 58, and users...

May 25, 2023 No Comments READ MORE +

Which of the following should the organization perform NEXT?

An organization is prioritizing efforts to remediate or mitigate risks identified during the latest assessment. For one of the risks, a full remediation was not possible, but the organization was able to successfully apply mitigations to reduce the likelihood of impact. Which of the following should the organization perform NEXT?A...

May 24, 2023 No Comments READ MORE +

Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be recovered?

Technicians have determined that the current server hardware is outdated, so they have decided to throw it out. Prior to disposal, which of the following is the BEST method to use to ensure no data remnants can be recovered?A . Drive wiping B. Degaussing C. Purging D. Physical destructionView AnswerAnswer:...

May 24, 2023 No Comments READ MORE +

Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?

Device event logs sources from MDM software as follows: Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?A . Malicious installation of an application; change the MDM configuration to remove application ID 1220. B. Resource leak; recover the...

May 24, 2023 No Comments READ MORE +

Which of the following would be the GREATEST risk In adopting this solution?

A company Is adopting a new artificial-intelligence-based analytics SaaS solution. This Is the company's first attempt at using a SaaS solution, and a security architect has been asked to determine any future risks. Which of the following would be the GREATEST risk In adopting this solution?A . The inability to...

May 24, 2023 No Comments READ MORE +

Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?

Despite the fact that ten new API servers were added, the load across servers was heavy at peak times. Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?A . Serve static content via distributed CDNs, create a...

May 24, 2023 No Comments READ MORE +

Which of the following is MOST likely the cause of the signature failing?

An administrator at a software development company would like to protect the integrity Of the company's applications with digital signatures. The developers report that the signing process keeps failing on all applications. The same key pair used for signing, however, is working properly on the website, is valid, and is...

May 24, 2023 No Comments READ MORE +

Which of the following would be the BEST solution against this type of attack?

A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks. Which of the following would be the BEST solution against this...

May 24, 2023 No Comments READ MORE +

Which of the following processes can be used to identify potential prevention recommendations?

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . Detection B. Remediation C. Preparation D. RecoveryView AnswerAnswer: A

May 24, 2023 No Comments READ MORE +