Which of the following architectural designs should the organization use to meet these requirements?

An organization is designing a network architecture that must meet the following requirements: Users will only be able to access predefined services. Each user will have a unique allow list defined for access. The system will construct one-to-one subject/object access paths dynamically. Which of the following architectural designs should the...

March 20, 2024 No Comments READ MORE +

Which of the following would be BEST suited to meet these requirements?

A vulnerability analyst identified a zero-day vulnerability in a company’s internally developed software. Since the current vulnerability management system does not have any checks for this vulnerability, an engineer has been asked to create one. Which of the following would be BEST suited to meet these requirements?A . ARFB ....

March 20, 2024 No Comments READ MORE +

Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users. Which of the following would be BEST for the developer to perform? (Choose two.)A . Utilize code signing by a trusted third party.B . Implement certificate-based authentication.C ....

March 20, 2024 No Comments READ MORE +

Which of the following solutions should the security engineer recommend to address these requirements?

A security engineer needs to recommend a solution that will meet the following requirements: Identify sensitive data in the provider’s network Maintain compliance with company and regulatory guidelines Detect and respond to insider threats, privileged user threats, and compromised accounts Enforce datacentric security, such as encryption, tokenization, and access control...

March 20, 2024 No Comments READ MORE +

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?A . Key sharingB . Key distributionC . Key recoveryD . Key escrowView AnswerAnswer: D Explanation: Key escrow is a process that involves storing encryption keys with a trusted third party, such...

March 20, 2024 No Comments READ MORE +

Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources. Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?A...

March 19, 2024 No Comments READ MORE +

Which of the following is the MOST cost-effective solution?

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to...

March 19, 2024 No Comments READ MORE +

Which of the following controls would be BEST for the analyst to recommend?

A security is assisting the marketing department with ensuring the security of the organization’s social media platforms. The two main concerns are: The Chief marketing officer (CMO) email is being used department wide as the username The password has been shared within the department Which of the following controls would...

March 19, 2024 No Comments READ MORE +

After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?

A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking. After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to...

March 19, 2024 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization.B . Deploy...

March 19, 2024 No Comments READ MORE +