Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which security concept requires continuous identity and authorization checks to allow access to data?

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Which security strategy is associated with data rights management solutions?

A.

Persistent protection

B.

Multilevel aggregation

C.

Enhanced detail

D.

Unexpired digital content

Which document, commonly existing in an IT enterprise, can be used to speed up the process of identifying a potential cloud service provider (CSP)?

A.

Entity relationship and data flow diagrams

B.

Physical plant blueprint

C.

Business continuity and disaster recovery plan

D.

Egress safety design

Which cloud architecture model provides application development services?

A.

Security as a Service (SECaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?

A.

Software error

B.

Frequency

C.

Time

D.

Baseline

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Which security information and event management concept focuses on account and service hijacking issues?

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

What is the first phase of identity management that is used to assert the identity of the user?

A.

Centralization

B.

Decentralization

C.

Provisioning

D.

Deprovisioning

Which action should be taken to ensure that unencrypted network traffic is protected?

A.

Data should be transmitted using the secure socket layer (SSL) protocol.

B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).

C.

Data should be transmitted using generic routing encapsulation (GRE).

D.

Data should be transmitted using the transport layer security (TLS) protocol.