Which of the following meets the budget needs of the business?
A cybersecurity analyst created the following tables to help determine the maximum budget amount the business can justify spending on an improved email filtering system: Which of the following meets the budget needs of the business?A . Filter ABCB . Filter XYZC . Filter GHID . Filter TUVView AnswerAnswer: C
Which of the following should be the analyst’s FIRST action?
A security analyst is performing a vulnerability assessment on behalf of a client. The analyst must define what constitutes a risk to the organization. Which of the following should be the analyst’s FIRST action?A . Create a full inventory of information and data assets.B . Ascertain the impact of an...
Which of the following would BEST safeguard the APIs?
A development team created a mobile application that contacts a company’s back-end APIs housed in a PaaS environment. The APIs have been experiencing high processor utilization due to scraping activities. The security engineer needs to recommend a solution that will prevent and remedy the behavior. Which of the following would...
Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?
Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint?A . Isolation control failureB . Management plane breachC . Insecure data deletionD . Resource exhaustionView AnswerAnswer: B
Which of the following encryption methods should the cloud security engineer select during the implementation phase?
A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security. Which of...
Which of the following BEST addresses the problem best address the problem with the least amount of administrative effort?
Over the last 90 days, many storage services has been exposed in the cloud services environments, and the security team does not have the ability to see is creating these instance. Shadow IT is creating data services and instances faster than the small security team can keep up with them....
Which of the following should be implemented for privileged users so they can support the environment from their workstations while remaining compliant?
A security compliance requirement states that specific environments that handle sensitive data must be protected by need-to-know restrictions and can only connect to authorized endpoints. The requirement also states that a DLP solution within the environment must be used to control the data from leaving the environment. Which of the...
Which of the following would provide this information?
A company's Chief Information Officer wants to Implement IDS software onto the current system's architecture to provide an additional layer of security. The software must be able to monitor system activity, provide Information on attempted attacks, and provide analysis of malicious activities to determine the processes or users Involved ....
In the shared responsibility model, which of the following levels of service meets this requirement?
Due to internal resource constraints, the management team has asked the principal security architect to recommend a solution that shifts partial responsibility for application-level controls to the cloud provider. In the shared responsibility model, which of the following levels of service meets this requirement?A . laaSB . SaaSC . FaaSD...
Which of the following BEST describes this type of contractual document?
An organization requires a contractual document that includes • An overview of what is covered • Goals and objectives • Performance metrics for each party • A review of how the agreement is managed by all parties Which of the following BEST describes this type of contractual document?A . SLAB...