Which of the following should the organization incorporate into the SDLC to ensure the security of the open-source libraries?

A security engineer was auditing an organization’s current software development practice and discovered that multiple open-source libraries were Integrated into the organization’s software. The organization currently performs SAST and DAST on the software it develops. Which of the following should the organization incorporate into the SDLC to ensure the security...

March 25, 2022 No Comments READ MORE +

Which of the following should the architect recommend to ensure all requirements are met in the MOST secure manner?

A security architect is reviewing the following proposed corporate firewall architecture and configuration: Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements: Web servers must receive all updates via HTTP/S from the corporate network. Web servers should not initiate communication with the...

March 24, 2022 No Comments READ MORE +

Which of the following should the engineer report as the ARO for successful breaches?

A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times. Which of the following should the engineer report as the ARO for successful breaches?A . 0.5B . 8C . 50D . 36,500View...

March 24, 2022 No Comments READ MORE +

Which of the following technologies allows CSPs to add encryption across multiple data storages?

Which of the following technologies allows CSPs to add encryption across multiple data storages?A . Symmetric encryptionB . Homomorphic encryptionC . Data dispersionD . Bit splittingView AnswerAnswer: A Explanation: Reference: https://www.hhs.gov/sites/default/files/nist800111.pdf

March 24, 2022 No Comments READ MORE +

Which of the following BEST explains why secure LDAP is not working?

A company that uses AD is migrating services from LDAP to secure LDAP. During the pilot phase, services are not connecting properly to secure LDAP. Block is an except of output from the troubleshooting session: Which of the following BEST explains why secure LDAP is not working? (Select TWO.)A ....

March 24, 2022 No Comments READ MORE +

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in the future.

A vulnerability scanner detected an obsolete version of an open-source file-sharing application on one of a company’s Linux servers. While the software version is no longer supported by the OSS community, the company’s Linux vendor backported fixes, applied them for all current vulnerabilities, and agrees to support the software in...

March 24, 2022 No Comments READ MORE +

When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the network?

A security architect for a large, multinational manufacturer needs to design and implement a security solution to monitor traffic. When designing the solution, which of the following threats should the security architect focus on to prevent attacks against the network?A . Packets that are the wrong size or lengthB ....

March 24, 2022 No Comments READ MORE +

Which of the following actions would BEST address the potential risks by the activity in the logs?

A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log. Which of the following actions would BEST address the potential risks by the activity in the logs?A ....

March 23, 2022 No Comments READ MORE +

Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation?

An organization wants to perform a scan of all its systems against best practice security configurations. Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)A . ARFB . XCCDFC ....

March 23, 2022 No Comments READ MORE +

Which of the following documents will MOST likely contain these elements?

Company A is establishing a contractual with Company B. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights . Which of the following documents will MOST likely contain these elements?A . Company A-B SLA v2.docxB . Company A...

March 23, 2022 No Comments READ MORE +