Which of the following is the most effective way to limit this access?
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?A . Data maskingB . EncryptionC . Geolocation policyD . Data sovereignty regulationView...
Which of the following actions would prevent this issue?
While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?A . Documenting the...
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?A . HacktivistB . WhistleblowerC . Organized crimeD . Unskilled attackerView AnswerAnswer: C Explanation: Organized crime is a type of threat actor that is motivated by...
Which of the following would be the best solution?
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?A . RDP serverB . Jump serverC . Proxy serverD . HypervisorView AnswerAnswer: B Explanation: = A jump server is...
Which of the following meets these requirements?
A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?A . Serverless frameworkB . Type 1 hvpervisorC . SD-WAND . SDNView AnswerAnswer: A Explanation: A serverless framework is a cloud-based application-hosting solution that meets the requirements of low-cost and cloud-based....
Which of the following enables the use of an input field to run commands that can view or manipulate data?
Which of the following enables the use of an input field to run commands that can view or manipulate data?A . Cross-site scriptingB . Side loadingC . Buffer overflowD . SQL injectionView AnswerAnswer: D Explanation: = SQL injection is a type of attack that enables the use of an input...
Which of the following would accomplish the manager's goal?
A network manager wants to protect the company's VPN by implementing multifactor authentication that uses: . Something you know . Something you have . Something you are Which of the following would accomplish the manager's goal?A . Domain name, PKI, GeolP lookupB . VPN IP address, company ID, facial structureC...
Which of the following are the best responses to this situation?
Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated: “I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email...
Which of the following activities describes the act of ignoring detected activity in the future?
A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?A . TuningB . AggregatingC . QuarantiningD . ArchivingView AnswerAnswer: A Explanation: Tuning is the activity of adjusting the configuration or...
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?A . AutomationB . Compliance checklistC . AttestationD . Manual auditView AnswerAnswer: A Explanation: Automation is the best way to consistently determine on a daily basis whether security...