Which of the following is the BEST solution?
A security architect works for a manufacturing organization that has many different branch offices. The architect is looking for a way to reduce traffic and ensure the branch offices receive the latest copy of revoked certificates issued by the CA at the organization’s headquarters location. The solution must also have...
Which of the following would be the BEST option to implement?
Due to locality and budget constraints, an organization’s satellite office has a lower bandwidth allocation than other offices in the organization. As a result, the local security infrastructure staff is assessing architectural options that will help preserve network bandwidth and increase speed to both internal and external resources while not...
Which of the following would be BEST to proceed with the transformation?
A company undergoing digital transformation is reviewing the resiliency of a CSP and is concerned about meeting SLA requirements in the event of a CSP incident. Which of the following would be BEST to proceed with the transformation?A . An on-premises solution as a backupB . A load balancer with...
Which of the following is a security concern that will MOST likely need to be addressed during migration?
A Chief Information Officer is considering migrating all company data to the cloud to save money on expensive SAN storage. Which of the following is a security concern that will MOST likely need to be addressed during migration?A . LatencyB . Data exposureC . Data lossD . Data dispersionView AnswerAnswer:...
Which of the following would satisfy the requirement?
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic. Which of the following would satisfy the requirement?A . NIDSB . NIPSC . WAFD ....
Which of the following is the MOST likely cause?
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application. Which of the following is the MOST likely cause?A . The user agent...
Which of the following techniques will MOST likely meet the business’s needs?
A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells. Which of the following techniques will MOST likely meet the business’s needs?A . Performing deep-packet inspection of all digital audio filesB . Adding identifying filesystem metadata to the digital audio filesC ....
Which of the following authentication protocols should the organization implement to support these requirements?
An organization is implementing a new identity and access management architecture with the following objectives: Supporting MFA against on-premises infrastructure Improving the user experience by integrating with SaaS applications Applying risk-based policies based on location Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support...
Which of the following threat management frameworks should the team implement?
A threat hunting team receives a report about possible APT activity in the network. Which of the following threat management frameworks should the team implement?A . NIST SP 800-53B . MITRE ATT&CKC . The Cyber Kill ChainD . The Diamond Model of Intrusion AnalysisView AnswerAnswer: B Explanation: MITRE ATT&CK is...
Which of the following should the engineer report as the ARO for successful breaches?
A security engineer estimates the company’s popular web application experiences 100 attempted breaches per day. In the past four years, the company’s data has been breached two times. Which of the following should the engineer report as the ARO for successful breaches?A . 0.5B . 8C . 50D . 36,500View...