Which of the following is the BEST solution to adopt?
Business partners are working on a Security mechanism lo validate transactions securely. The requirement is for one company to be responsible for deploying a trusted solution that will register and issue artifacts used to sign encrypt, and decrypt transaction files. Which of the following is the BEST solution to adopt?A...
Which of the following concepts does this message describe?
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen: Please use a combination of numbers, special characters, and letters in the password field. Which of the following concepts does this message describe?A...
Which of the following would mitigate the manager's concerns?
A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?A . Implement a full system...
Which of the following would MOST likely meet the organizations requirement?
An organization wants to participate in threat intelligence information sharing with peer groups. Which of the following would MOST likely meet the organizations requirement?A . Perform OSINT investigations B. Subscribe to threat intelligence feeds C. Submit RFCs D. Implement a TAXII serverView AnswerAnswer: B
Which of the following is the BEST remediation strategy?
A security analyst is concerned about critical vulnerabilities that have been detected on some applications running inside containers. Which of the following is the BEST remediation strategy?A . Update the base container image and redeploy the environment B. Include the containers in the regular patching schedule for servers C. Patch...
A SOC operator is analyzing a log file that contains the following entries:
A SOC operator is analyzing a log file that contains the following entries: A . SQL injection and improper input-handling attempts B. Cross-site scripting and resource exhaustion attempts C. Command injection and directory traversal attempts D. Error handling and privilege escalation attemptsView AnswerAnswer: C
Which of the following should the organization consider before implementation?
An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).A . The back-end directory source B. The identity federation protocol C. The hashing method D. The encryption...
Which of the following BEST describes what the administrator is being advised to do?
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?A . Perform a mathematical operation on the passwords that will convert them into unglue stings B. Add extra data to the...
Which of the following is assured when a user signs an email using a private key?
Which of the following is assured when a user signs an email using a private key?A . Non-repudiation B. Confidentiality C. Availably D. AuthenticationView AnswerAnswer: A Explanation: Non Repudiation is your virtual John Hancock. It's a way of virtually stamping any data or document with "I am who I say...
Which of the following would be the MOST prudent course of action?
A recent audit cited a risk involving numerous low-criticality vulnerabilities created by a web application using a third-party library. The development staff state there are still customers using the application even though it is end of life and it would be a substantial burden to update the application for compatibility...