Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?
Which of the following hardening techniques must be applied on a container image before deploying it to a production environment? (Select two).
An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?
Which of the following describes the procedures a penetration tester must follow while conducting a test?
A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?
A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?
An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
At the start of a penetration test, the tester checks OSINT resources for information about the client environment. Which of the following types of reconnaissance is the tester performing?
A network engineer is increasing the overall security of network devices and needs to harden the devices. Which of the following will best accomplish this task?
Which of the following best describes a method for ongoing vendor monitoring in third-party risk management?
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?
Which of the following should a security team do first before a new web server goes live?
A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?