A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?
Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
Which of the following techniques would identify whether data has been modified in transit?
Which of the following uses proprietary controls and is designed to function in harsh environments over many years with limited remote access management?
The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?
Which of the following methods would most likely be used to identify legacy systems?
A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
An employee clicks a malicious link in an email that appears to be from the company's Chief Executive Officer. The employee's computer is infected with ransomware that encrypts the company's files. Which of the following is the most effective way for the company to prevent similar incidents in the future?
Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?
Which of the following should a company use to provide proof of external network security testing?
An administrator implements web-filtering products but still sees that users are visiting malicious links. Which of the following configuration items does the security administrator need to review?
An employee who was working remotely lost a mobile device containing company data. Which of the following provides the best solution to prevent future data loss?
Which of the following would be the best way to block unknown programs from executing?
The management team reports employees are missing features on company-provided tablets, causing productivity issues. The team directs IT to resolve the issue within 48 hours. Which of the following is the best solution?