Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following should be used to ensure that a new software release has not been modified before reaching the user?

A.

Tokenization

B.

Encryption

C.

Hashing

D.

Obfuscation

Which of the following receives logs from various devices and services, and then presents alerts?

A.

SIEM

B.

SCADA

C.

SNMP

D.

SCAP

Which of the following is an example of a certificate that is generated by an internal source?

A.

Digital signature

B.

Asymmetric key

C.

Self-signed

D.

Symmetric key

During a recent log review, an analyst discovers evidence of successful injection attacks. Which of the following will best address this issue?

A.

Authentication

B.

Secure cookies

C.

Static code analysis

D.

Input validation

Which of the following practices would be best to prevent an insider from introducing malicious code into a company's development process?

A.

Code scanning for vulnerabilities

B.

Open-source component usage

C.

Quality assurance testing

D.

Peer review and approval

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

A.

Secured zones

B.

Subject role

C.

Adaptive identity

D.

Threat scope reduction

A security analyst wants to automate a task that shares data between systems. Which of the following is the best option for the analyst to use?

A.

SOAR

B.

API

C.

SFTP

D.

RDP

Which of the following is the most relevant reason a DPO would develop a data inventory?

A.

To manage data storage requirements better

B.

To determine the impact in the event of a breach

C.

To extend the length of time data can be retained

D.

To automate the reduction of duplicated data

Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

A.

Encrypted

B.

Intellectual property

C.

Critical

D.

Data in transit

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

A.

Secure cookies

B.

Input sanitization

C.

Code signing

D.

Blocklist

Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?

A.

Contractual impacts

B.

Sanctions

C.

Fines

D.

Reputational damage

While conducting a business continuity tabletop exercise, the security team becomes concerned by potential impacts if a generator fails during failover. Which of the following is the team most likely to consider in regard to risk management activities?

A.

RPO

B.

ARO

C.

BIA

D.

MTTR

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.

Which of the following best describes the user’s activity?

A.

Penetration testing

B.

Phishing campaign

C.

External audit

D.

Insider threat

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

A.

Hacktivist

B.

Whistleblower

C.

Organized crime

D.

Unskilled attacker

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

A.

Buffer overflow

B.

NTP amplification attack

C.

Worm

D.

Kerberoasting attack