Which of the following should a security team do first before a new web server goes live?
A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?
A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?
A security team wants to work with the development team to ensure WAF policies are automatically created when applications are deployed. Which concept describes this capability?
A new corporate policy requires all staff to use multifactor authentication to access company resources. Which of the following can be utilized to set up this form of identity and access management? (Select two)
An organization wants to donate its aging network hardware. Which of the following should the organization perform to prevent any network details from leaking?
The Chief Information Security Officer gives the security community the opportunity to report vulnerabilities on the organization’s public-facing assets. Which of the following does this scenario best describe?
Which of the following data types best describes an AI tool developed by a company to automate the ticketing system under a specific contract?
A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?
Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?
Which of the following is used to quantitatively measure the criticality of a vulnerability?
A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?