Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches.

What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?

A.

Impact

B.

Risk

C.

Threat actors

D.

Likelihood

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

What is a characteristic of algorithms?

A.

No starting or stopping point

B.

Random instructions

C.

Unambiguous rules

D.

Constantly changing

An IT team has been tasked with improving the security of a company’s web applications.

Which threats should the IT team consider detecting when defending the network with a web application firewall (WAF)?

A.

Phishing attacks

B.

Brute force attacks

C.

Structured Query Language (SQL) injection attacks

D.

Social engineering attacks

A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.

Which security control will protect the confidentiality of network device information within this organization?

A.

Access controls

B.

Network segmentation

C.

Encryption

D.

Security monitoring

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

A.

Virtual network peering

B.

Virtual local area network

C.

Remote Desktop Protocol

D.

Domain name system

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution