A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implement
A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implementA . federated authentication B. role-based access control. C. manual account reviews D. multifactor authentication.View AnswerAnswer: A
Which of the following would be the MOST appropriate to remediate the controller?
An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...
Which of the following would be the MOST efficient way to increase the security posture of the organization in the shortest amount of time?
A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of issues patch management in the environment and expects a large number of findings . Which of the following would be the MOST efficient way to...
Which of the following is the BEST approach for supply chain assessment when selecting a vendor?
An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC. Which of the following is the BEST approach for supply chain assessment when selecting a vendor?A . Gather information from providers, including datacenter specifications and copies...
Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?
Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?A . Reverse engineering B. Fuzzing C. Penetration testing D. Network mappingView AnswerAnswer: C
Which of the following changes should the security analyst make to BEST protect the environment?
A security analyst has discovered trial developers have installed browsers on all development servers in the company's cloud infrastructure and are using them to browse the Internet . Which of the following changes should the security analyst make to BEST protect the environment?A . Create a security rule that blocks...
Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?
Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?A . Reverse engineering B. Application log collectors C. Workflow orchestration D. API integration E. ScriptingView AnswerAnswer: D
A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security.
A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security. To BEST complete this task, the analyst should place the:A . firewall behind the VPN server B. VPN server parallel to the firewall C. VPN server behind the...
Which of the following would BEST accomplish this goal?
A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic. Which of the following would BEST accomplish this goal?A . Continuous integration and deployment B. Automation and orchestration C. Static and dynamic analysis D. Information sharing and analysisView AnswerAnswer:...
Which of the following solutions would meet this requirement?
A development team signed a contract that requires access to an on-premises physical server. Access must be restricted to authorized users only and cannot be connected to the Internet. Which of the following solutions would meet this requirement?A . Establish a hosted SSO. B. Implement a CASB. C. Virtualize the...