A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implement

A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization To BEST resolve the issue, the organization should implementA . federated authentication B. role-based access control. C. manual account reviews D. multifactor authentication.View AnswerAnswer: A

September 19, 2022 No Comments READ MORE +

Which of the following would be the MOST appropriate to remediate the controller?

An analyst is working with a network engineer to resolve a vulnerability that was found in a piece of legacy hardware, which is critical to the operation of the organization's production line. The legacy hardware does not have third-party support, and the OEM manufacturer of the controller is no longer...

September 19, 2022 No Comments READ MORE +

Which of the following would be the MOST efficient way to increase the security posture of the organization in the shortest amount of time?

A security team is implementing a new vulnerability management program in an environment that has a historically poor security posture. The team is aware of issues patch management in the environment and expects a large number of findings . Which of the following would be the MOST efficient way to...

September 19, 2022 No Comments READ MORE +

Which of the following is the BEST approach for supply chain assessment when selecting a vendor?

An analyst is participating in the solution analysis process for a cloud-hosted SIEM platform to centralize log monitoring and alerting capabilities in the SOC. Which of the following is the BEST approach for supply chain assessment when selecting a vendor?A . Gather information from providers, including datacenter specifications and copies...

September 19, 2022 No Comments READ MORE +

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?

Which of the following is the use of tools to simulate the ability for an attacker to gain access to a specified network?A . Reverse engineering B. Fuzzing C. Penetration testing D. Network mappingView AnswerAnswer: C

September 18, 2022 No Comments READ MORE +

Which of the following changes should the security analyst make to BEST protect the environment?

A security analyst has discovered trial developers have installed browsers on all development servers in the company's cloud infrastructure and are using them to browse the Internet . Which of the following changes should the security analyst make to BEST protect the environment?A . Create a security rule that blocks...

September 18, 2022 No Comments READ MORE +

Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?

Which of the following will allow different cloud instances to share various types of data with a minimal amount of complexity?A . Reverse engineering B. Application log collectors C. Workflow orchestration D. API integration E. ScriptingView AnswerAnswer: D

September 18, 2022 No Comments READ MORE +

A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security.

A cybersecurity analyst needs to rearchitect the network using a firewall and a VPN server to achieve the highest level of security. To BEST complete this task, the analyst should place the:A . firewall behind the VPN server B. VPN server parallel to the firewall C. VPN server behind the...

September 18, 2022 No Comments READ MORE +

Which of the following would BEST accomplish this goal?

A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic. Which of the following would BEST accomplish this goal?A . Continuous integration and deployment B. Automation and orchestration C. Static and dynamic analysis D. Information sharing and analysisView AnswerAnswer:...

September 18, 2022 No Comments READ MORE +

Which of the following solutions would meet this requirement?

A development team signed a contract that requires access to an on-premises physical server. Access must be restricted to authorized users only and cannot be connected to the Internet. Which of the following solutions would meet this requirement?A . Establish a hosted SSO. B. Implement a CASB. C. Virtualize the...

September 17, 2022 No Comments READ MORE +