A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
A security engineer needs to quickly identify a signature from a known malicious file. Which of the following analysis methods would the security engineer most likely use?
Which of the following describes effective change management procedures?
Which of the following describes the procedures a penetration tester must follow while conducting a test?
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?
A systems administrator discovers a system that is no longer receiving support from the vendor. However, this system and its environment are critical to running the business, cannot be modified, and must stay online. Which of the following risk treatments is the most appropriate in this situation?
Which of the following is the best reason to complete an audit in a banking environment?
Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?
A company plans to secure its systems by:
Preventing users from sending sensitive data over corporate email
Restricting access to potentially harmful websites
Which of the following features should the company set up? (Select two).
A security team purchases a tool for cloud security posture management. The team is quickly overwhelmed by the number of misconfigurations that the tool detects. Which of the following should the security team configure to establish workflows for cloud resource security?
Which of the following is the first step to take when creating an anomaly detection process?
A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?
During an investigation, a security analyst discovers traffic going out to a command-and-control server. The analyst must find out if any data exfiltration has occurred. Which of the following would best help the analyst determine this?
When trying to access an internal website, an employee reports that a prompt displays, stating that the site is insecure. Which of the following certificate types is the site most likely using?
A security analyst wants to automate a task that shares data between systems. Which of the following is the best option for the analyst to use?