Which of the following explains the reason why an architect would set up the network this way?
A proposed network architecture requires systems to be separated from each other logically based on defined risk levels. Which of the following explains the reason why an architect would set up the network this way?A . To complicate the network and frustrate a potential malicious attackerB . To reduce the...
A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks in
A bad actor bypasses authentication and reveals all records in a database through an SQL injection. Implementation of which of the following would work BEST to prevent similar attacks inA . Strict input validationB . BlacklistingC . SQL patchingD . Content filteringE . Output encodingView AnswerAnswer: A
Which of the following is the BEST remediation for this vulnerability?
A remote code execution vulnerability was discovered in the RDP. An organization currently uses RDP for remote access to a portion of its VDI environment. The analyst verified network-level authentication is enabled. Which of the following is the BEST remediation for this vulnerability?A . Verify the latest endpoint-protection signature is...
In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?
A Chief Security Officer (CSO) is working on the communication requirements (or an organization's incident response plan. In addition to technical response activities, which of the following is the main reason why communication must be addressed in an effective incident response program?A . Public relations must receive information promptly in...
In web application scanning, static analysis refers to scanning:
In web application scanning, static analysis refers to scanning:A . the system for vulnerabilities before installing the application.B . the compiled code of the application to detect possible issues.C . an application that is installed and active on a system.D . an application that is installed on a system that...
A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization.
A security analyst discovers accounts in sensitive SaaS-based systems are not being removed in a timely manner when an employee leaves the organization. To BEST resolve the issue, the organization should implementA . federated authenticationB . role-based access control.C . manual account reviewsD . multifactor authentication.View AnswerAnswer: A
Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in the future?
During an investigation, a security analyst determines suspicious activity occurred during the night shift over the weekend. Further investigation reveals the activity was initiated from an internal IP going to an external website. Which of the following would be the MOST appropriate recommendation to prevent the activity from happening in...
Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?
The Chief Information Officer (CIO) of a large healthcare institution is concerned about all machines having direct access to sensitive patient information. Which of the following should the security analyst implement to BEST mitigate the risk of sensitive data exposure?A . A cloud access service broker systemB . NAC to...
Which of the following will fix the cause of the issue?
A web-based front end for a business intelligence application uses pass-through authentication to authenticate users. The application then uses a service account, to perform queries and look up data m a database A security analyst discovers employees are accessing data sets they have not been authorized to use. Which of...
Which of the following is the BEST solution for the security analyst to implement?
While analyzing network traffic, a security analyst discovers several computers on the network are connecting to a malicious domain that was blocked by a DNS sinkhole. A new private IP range is now visible, but no change requests were made to add it. Which of the following is the BEST...