Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?
Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?A . Importing the availability of messagesB . Ensuring non-repudiation of messagesC . Enforcing protocol conformance for messagesD . Assuring the integrity of messagesView AnswerAnswer:...
Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?
Despite the fact that ten new API servers were added, the load across servers was heavy at peak times. Which of the following infrastructure design changes would be BEST for the organization to implement to avoid these issues in the future?A . Serve static content via distributed CDNs, create a...
Which of the following ciphers should the security analyst remove to support the business requirements?
A new web server must comply with new secure-by-design principles and PCI DSS. This includes mitigating the risk of an on-path attack. A security analyst is reviewing the following web server configuration: Which of the following ciphers should the security analyst remove to support the business requirements?A . TLS_AES_128_CCM_8_SHA256B ....
Which of the following techniques would be BEST suited for this requirement?
A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run...
Which of the following would be the BEST recommendation for storing and monitoring access to these shared credentials?
A company hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements: https://i.postimg.cc/8P9sB3zx/image.png The credentials used to publish production software to the container registry should be stored in a secure location. Access should be restricted to...
Which of the following should the security engineer do to BEST manage the threats proactively?
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?A . Join an information-sharing community that is relevant to...
Which of the following solutions would BEST meet these requirements?
A company plans to build an entirely remote workforce that utilizes a cloud-based infrastructure. The Chief Information Security Officer asks the security engineer to design connectivity to meet the following requirements: Only users with corporate-owned devices can directly access servers hosted by the cloud provider. The company can control what...
Which of the following would BEST secure the company’s CI/CD pipeline?
A security engineer thinks the development team has been hard-coding sensitive environment variables in its code. Which of the following would BEST secure the company’s CI/CD pipeline?A . Utilizing a trusted secrets managerB . Performing DAST on a weekly basisC . Introducing the use of container orchestrationD . Deploying instance...
Which of the following processes can be used to identify potential prevention recommendations?
An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?A . DetectionB . RemediationC . PreparationD . RecoveryView AnswerAnswer: C Explanation: Preparation...
Which of the following technologies would mitigate the manipulation of memory segments?
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation: graphic.linux_randomization.prg Which of the following technologies would mitigate the manipulation of memory segments?A . NX bitB . ASLRC . DEPD . HSMView AnswerAnswer: B Explanation: https://eklitzke.org/memory-protection-and-aslr ASLR (Address Space Layout Randomization)...