Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following should occur FIRST during the vulnerability identification phase?

A.

Inform relevant stakeholders that vulnerability scanning will be taking place.

B.

Run vulnerability scans of all in-scope assets.

C.

Determine the categories of vulnerabilities possible for the type of asset being tested.

D.

Assess the risks associated with the vulnerabilities Identified.

Which of the following is a KEY difference between traditional deployment methods and continuous integration/continuous deployment (CI/CD)?

A.

CI/CD decreases the frequency of updates.

B.

CI/CD decreases the amount of testing.

C.

CI/CD increases the number of errors.

D.

CI/CD Increases the speed of feedback.

Which of the following is the MOST common output of a vulnerability assessment?

A.

A list of identified vulnerabilities along with a severity level for each

B.

A detailed report on the overall vulnerability posture, including physical security measures

C.

A list of potential attackers along with their IP addresses and geolocation data

D.

A list of authorized users and their access levels for each system and application

Which of the following is the core component of an operating system that manages resources, implements security policies, and provides the interface between hardware and software?

A.

Kernel

B.

Library

C.

Application

D.

Shell

Which of the following BEST offers data encryption, authentication, and integrity of data flowing between a server and the client?

A.

Secure Sockets Layer (SSL)

B.

Kerbcros

C.

Transport Layer Security (TLS)

D.

Simple Network Management Protocol (SNMP)

Target discovery and service enumeration would MOST likely be used by an attacker who has the initial objective of:

A.

corrupting process memory, likely resulting in system Instability.

B.

port scanning to identify potential attack vectors.

C.

deploying and maintaining backdoor system access.

D.

gaining privileged access in a complex network environment.

Which of the following Is a control message associated with the Internet Control Message Protocol (ICMP)?

A.

Transport Layer Security (TLS) protocol version Is unsupported.

B.

Destination is unreachable.

C.

404 is not found.

D.

Webserver Is available.

Which of the following should be considered FIRST when defining an application security risk metric for an organization?

A.

Critically of application data

B.

Identification of application dependencies

C.

Creation of risk reporting templates

D.

Alignment with the system development life cycle (SDLC)

SOAP and REST are Iwo different approaches related to:

A.

machine learning (ML) design.

B.

cloud-based anomaly detection.

C.

SG/6G networks.

D.

application programming Interface (API) design.

An organization's financial data was compromised and posted online. The forensics review confirms proper access rights and encryption of the database at the host site. A lack of which of the following controls MOST likely caused the exposure?

A.

Continual backups

B.

Multi-factor authentication (MFA)

C.

Encryption o' data in transit

D.

Properly configured firewall