Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A company is reviewing the results of the Nikto scan, and they determined that several internal web servers (likely associated with internal web applications) have a number of vulnerabilities. They also noticed several servers that have returned click-jacking vulnerabilities. Which option should be used to remediate this issue?

A.

Update the SSL server certificate.

B.

Upgrade the SSL version.

C.

Modify the SSL cipher configuration.

D.

Modify the HTTP X-Frame-Options.

What are three examples of incident response? (Choose three.)

A.

Dealing with systems that are suspected to be used to commit a crime

B.

Collecting data from computer media

C.

Dealing with systems suspected to be the victim of a crime

D.

Analyzing a system

E.

Threat Modeling

What is the BEST process to identify the vendors that will ensure protection and compliance with security and privacy laws?

A.

Vulnerability assessment

B.

Risk assessment

C.

Penetration testing

D.

Security and privacy review

Which of the following is the FIRST step taken to maintain the chain of custody in a forensic investigation?

A.

Security and evaluating the electronic crime scene.

B.

Transporting the evidence to the forensics lab

C.

Packaging the electronic device

D.

Conducting preliminary interviews