Which of the following actions would BEST address the potential risks by the activity in the logs?
A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/auth.log: graphic.ssh_auth_log. Which of the following actions would BEST address the potential risks by the activity in the logs?A ....
Which of the following BEST explains why secure LDAP is not working?
A company that uses AD is migrating services from LDAP to secure LDAP. During the pilot phase, services are not connecting properly to secure LDAP. Block is an except of output from the troubleshooting session: Which of the following BEST explains why secure LDAP is not working? (Select TWO.)A ....
Which of the following is the BEST option to resolve the boar’s concerns for this email migration?
The Chief information Officer (CIO) asks the system administrator to improve email security at the company based on the following requirements: * Transaction being requested by unauthorized individuals. * Complete discretion regarding client names, account numbers, and investment information. * Malicious attackers using email to malware and ransomeware. * Exfiltration...
Which of the following would mitigate the department’s concerns?
All staff at a company have started working remotely due to a global pandemic. To transition to remote work, the company has migrated to SaaS collaboration tools. The human resources department wants to use these tools to process sensitive information but is concerned the data could be: Leaked to the...
Which of the following should the company implement to ensure it can meet the computing demand while complying with healthcare standard for virtualization and cloud computing?
A health company has reached the physical and computing capabilities in its datacenter, but the computing demand continues to increase. The infrastructure is fully virtualized and runs custom and commercial healthcare application that process sensitive health and payment information. Which of the following should the company implement to ensure it...
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?
Despite the fact that ten new API servers were added, the load across servers was heavy at peak times. Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?A . Serve static content via distributed CDNs, create a...
Which of the following solutions should the network architect implement to meet the requirements?
Documents downloaded from websites must be scanned for malware. Which of the following solutions should the network architect implement to meet the requirements?A . Reverse proxy, stateful firewalls, and VPNs at the local sitesB . IDSs, WAFs, and forward proxy IDSC . DoS protection at the hub site, mutual certificate...
Which of the following vulnerabilities does the code snippet resolve?
A developer implement the following code snippet. Which of the following vulnerabilities does the code snippet resolve?A . SQL injectB . Buffer overflowC . Missing session limitD . Information leakageView AnswerAnswer: A Explanation: SQL injection is a type of vulnerability that allows an attacker to execute malicious SQL commands on...
Which of the following sources could the architect consult to address this security concern?
A security architect is implementing a web application that uses a database back end. Prior to the production, the architect is concerned about the possibility of XSS attacks and wants to identify security controls that could be put in place to prevent these attacks. Which of the following sources could...
Which of the following would BEST secure the routes while allowing the network to function in the event of a single provider failure?
After a security incident, a network security engineer discovers that a portion of the company’s sensitive external traffic has been redirected through a secondary ISP that is not normally used. Which of the following would BEST secure the routes while allowing the network to function in the event of a...