Which of the following would be BEST for the developer to perform?

A developer wants to maintain integrity to each module of a program and ensure the code cannot be altered by malicious users. Which of the following would be BEST for the developer to perform? (Choose two.)A . Utilize code signing by a trusted third party.B . Implement certificate-based authentication.C ....

March 14, 2025 No Comments READ MORE +

Which of the following would be the BEST solution against this type of attack?

A developer is creating a new mobile application for a company. The application uses REST API and TLS 1.2 to communicate securely with the external back-end server. Due to this configuration, the company is concerned about HTTPS interception attacks. Which of the following would be the BEST solution against this...

March 13, 2025 No Comments READ MORE +

Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements. Which of the following would...

March 12, 2025 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization.B . Deploy...

March 11, 2025 No Comments READ MORE +

Which of the following BEST sets expectation between the security team and business units within an organization?

Which of the following BEST sets expectation between the security team and business units within an organization?A . Risk assessmentB . Memorandum of understandingC . Business impact analysisD . Business partnership agreementE . Services level agreementView AnswerAnswer: E Explanation: A service level agreement (SLA) is the best option to set...

March 7, 2025 No Comments READ MORE +

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?A . Key sharingB . Key distributionC . Key recoveryD . Key escrowView AnswerAnswer: D Explanation: Key escrow is a process that involves storing encryption keys with a trusted third party, such...

March 7, 2025 No Comments READ MORE +

Which of the following system should the engineer consider NEXT to mitigate the associated risks?

A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer’s company. The network already includes a SEIM and a NIPS and requires...

March 7, 2025 No Comments READ MORE +

Which of the following will allow the inspection of the data without multiple certificate deployments?

A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed. Which of the following will allow the inspection of the data without multiple certificate deployments? A. Include all available cipher suites. B. Create a wildcard certificate....

March 3, 2025 No Comments READ MORE +

Which of the following encryption methods should the cloud security engineer select during the implementation phase?

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security. Which of...

March 3, 2025 No Comments READ MORE +

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?A . Deploy a SOAR tool.B . Modify user password history...

March 2, 2025 No Comments READ MORE +