Which of the following is the security analyst MOST likely implementing?
A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected. Which of the following is the security analyst MOST likely implementing?A . Vulnerability scans B. User behavior analysis C. Security orchestration, automation, and response D. Threat...
Digital signatures use asymmetric encryption. This means the message is encrypted with:
Digital signatures use asymmetric encryption. This means the message is encrypted with:A . the sender's private key and decrypted with the sender's public key B. the sender's public key and decrypted with the sender's private key C. the sender’s private key and decrypted with the recipient's public key. D. the...
Which of the following is the BEST security solution to reduce this risk?
The Chief Information Security Officer directed a nsk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?A . CASB B. VPN concentrator C. MFA D. VPC...
Which of the following was MOST likely observed?
A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into cltckmg the following: Which of the following was MOST likely observed?A . DLL injection B. Session...
Which of the following solutions should the SOC consider to BEST improve its response time?
The SOC for a large MSSP is meeting to discuss the lessons learned from a recent incident that took much too long to resolve This type of incident has become more common in recent weeks and is consuming large amounts of the analysts' time due to manual tasks being performed....
Which of the following will increase cryptographic security?
Which of the following will increase cryptographic security?A . High data entropy B. Algorithms that require less computing power C. Longer key longevity D. HashingView AnswerAnswer: C
Which of the following solutions should the engineer implement?
An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?A . Proxy server B. WAF C. Load balancer D. VPNView AnswerAnswer: B
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?A . Common Weakness Enumeration B. OSINT C. Dark web D. Vulnerability databasesView AnswerAnswer: C
Which of the following would mitigate the manager's concerns?
A business operations manager is concerned that a PC that is critical to business operations will have a costly hardware failure soon. The manager is looking for options to continue business operations without incurring large costs. Which of the following would mitigate the manager's concerns?A . Implement a full system...
Which of the following can be used to accomplish this task?
An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?A . Application allow list B. SWG C. Host-based firewall D. VPNView AnswerAnswer: B