Which of the following would MOST likely help the company gain consensus to move the data to the cloud?

A company processes data subject to NDAs with partners that define the processing and storage constraints for the covered data. The agreements currently do not permit moving the covered data to the cloud, and the company would like to renegotiate the terms of the agreements. Which of the following would...

March 12, 2025 No Comments READ MORE +

Which of the following actions would BEST resolve the issue?

A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.)A . Conduct input sanitization.B . Deploy...

March 11, 2025 No Comments READ MORE +

Which of the following BEST sets expectation between the security team and business units within an organization?

Which of the following BEST sets expectation between the security team and business units within an organization?A . Risk assessmentB . Memorandum of understandingC . Business impact analysisD . Business partnership agreementE . Services level agreementView AnswerAnswer: E Explanation: A service level agreement (SLA) is the best option to set...

March 7, 2025 No Comments READ MORE +

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?

Which of the following terms refers to the delivery of encryption keys to a CASB or a third-party entity?A . Key sharingB . Key distributionC . Key recoveryD . Key escrowView AnswerAnswer: D Explanation: Key escrow is a process that involves storing encryption keys with a trusted third party, such...

March 7, 2025 No Comments READ MORE +

Which of the following system should the engineer consider NEXT to mitigate the associated risks?

A security engineer at a company is designing a system to mitigate recent setbacks caused competitors that are beating the company to market with the new products. Several of the products incorporate propriety enhancements developed by the engineer’s company. The network already includes a SEIM and a NIPS and requires...

March 7, 2025 No Comments READ MORE +

Which of the following will allow the inspection of the data without multiple certificate deployments?

A company is implementing SSL inspection. During the next six months, multiple web applications that will be separated out with subdomains will be deployed. Which of the following will allow the inspection of the data without multiple certificate deployments? A. Include all available cipher suites. B. Create a wildcard certificate....

March 3, 2025 No Comments READ MORE +

Which of the following encryption methods should the cloud security engineer select during the implementation phase?

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used. The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security. Which of...

March 3, 2025 No Comments READ MORE +

Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?

An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?A . Deploy a SOAR tool.B . Modify user password history...

March 2, 2025 No Comments READ MORE +

Which of the following controls would be BEST for the analyst to recommend?

A security is assisting the marketing department with ensuring the security of the organization’s social media platforms. The two main concerns are: The Chief marketing officer (CMO) email is being used department wide as the username The password has been shared within the department Which of the following controls would...

March 2, 2025 No Comments READ MORE +

Which of the following must the company do to ensure GDPR compliance?

A company is preparing to deploy a global service. Which of the following must the company do to ensure GDPR compliance? (Choose two.)A . Inform users regarding what data is stored.B . Provide opt-in/out for marketing messages.C . Provide data deletion capabilities.D . Provide optional data encryption.E . Grant data...

February 26, 2025 No Comments READ MORE +