Which of the following should be the analyst’s FIRST action?

A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization. Which of the following should be the analyst’s FIRST action?A . Create a full inventory of information and data assets.B . Ascertain the impact of an...

April 14, 2025 No Comments READ MORE +

Which of the following authentication protocols should the organization implement to support these requirements?

An organization is implementing a new identity and access management architecture with the following objectives: Supporting MFA against on-premises infrastructure Improving the user experience by integrating with SaaS applications Applying risk-based policies based on location Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support...

April 13, 2025 No Comments READ MORE +

Which of the following processes can be used to identify potential prevention recommendations?

An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . DetectionB . RemediationC . PreparationD . RecoveryView AnswerAnswer: C Explanation: Preparation...

April 9, 2025 No Comments READ MORE +

Which of the following would BEST secure the REST API connection to the database while preventing the use of a hard-coded string in the request string?

An enterprise is deploying APIs that utilize a private key and a public key to ensure the connection string is protected. To connect to the API, customers must use the private key. Which of the following would BEST secure the REST API connection to the database while preventing the use...

April 8, 2025 No Comments READ MORE +

Which of the following architectural designs should the organization use to meet these requirements?

An organization is designing a network architecture that must meet the following requirements: Users will only be able to access predefined services. Each user will have a unique allow list defined for access. The system will construct one-to-one subject/object access paths dynamically. Which of the following architectural designs should the...

April 7, 2025 No Comments READ MORE +

Which of the following should be implemented to BEST manage the risk?

The Chief information Officer (CIO) of a large bank, which uses multiple third-party organizations to deliver a service, is concerned about the handling and security of customer data by the parties. Which of the following should be implemented to BEST manage the risk?A . Establish a review committee that assesses...

April 4, 2025 No Comments READ MORE +

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.

A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.A . Impalement application whitelisting and...

April 2, 2025 No Comments READ MORE +

Which of the following is the MOST cost-effective solution?

An e-commerce company is running a web server on premises, and the resource utilization is usually less than 30%. During the last two holiday seasons, the server experienced performance issues because of too many connections, and several customers were not able to finalize purchase orders. The company is looking to...

April 2, 2025 No Comments READ MORE +

Which of the following should the security team recommend FIRST?

A university issues badges through a homegrown identity management system to all staff and students. Each week during the summer, temporary summer school students arrive and need to be issued a badge to access minimal campus resources. The security team received a report from an outside auditor indicating the homegrown...

April 2, 2025 No Comments READ MORE +

Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?

A security analyst is researching containerization concepts for an organization. The analyst is concerned about potential resource exhaustion scenarios on the Docker host due to a single application that is overconsuming available resources. Which of the following core Linux concepts BEST reflects the ability to limit resource allocation to containers?A...

March 31, 2025 No Comments READ MORE +