Which of the following is the best reason to complete an audit in a banking environment?
A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?
Which of the following must be considered when designing a high-availability network? (Choose two).
Which of the following topics would most likely be included within an organization's SDLC?
An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins. Which of the following attacks Is most likely the cause of the malware?
Which of the following best describe a penetration test that resembles an actual external attach?
Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
Which of the following is die most important security concern when using legacy systems to provide production service?
Which of the following is required for an organization to properly manage its restore process in the event of system failure?
Which of the following would a security administrator use to comply with a secure baseline during a patch update?
An organization has too many variations of a single operating system and needs to standardize the arrangement prior to pushing the system image to users. Which of the following should the organization implement first?
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?
A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?
A security officer is implementing a security awareness program and is placing security-themed posters around the building and is assigning online user training. Which of the following would the security officer most likely implement?
Which of the following involves an attempt to take advantage of database misconfigurations?