In which of the following types of fuzz testing strategies the new data will be generated
from scratch and the amount of data to be generated are predefined based on the
testing model?
FinTechHub, a financial tech startup, experienced a Cross-Site Scripting (XSS) attack on their main application. Post the incident the team is keen on implementing proactive measures to handle such vulnerabilities. What should be their primary focus to prevent future XSS attacks?
After a web application attack, HealthFirst traced the breach to an insecure Direct Object Reference (IDOR) vulnerability. They want to patch it and fortify the app. What should be their primary action?
Identify Sarbanes–Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of
securities analysts.
Which of the following risk mitigation strategies involves execution of controls to
reduce the risk factor and brings it to an acceptable level or accepts the potential risk
and continues operating the IT system?
An organization named Sam Morison Inc. decided to use cloud-based services to reduce
the cost of maintenance. The organization identified various risks and threats
associated with cloud service adoption and migrating business-critical data to thirdparty systems. Hence, the organization decided to deploy cloud-based security tools to
prevent upcoming threats.
Which of the following tools help the organization to secure the cloud resources and
services?
SevTech detected malicious code injected into its client data protection module, with indicators of a nation-state actor. In this high-pressure scenario, what should be SevTech's primary course of action?
Malicious Micky has moved from the delivery stage to the exploitation stage of the kill chain. This malware wants to find and report to the command center any useful services on the system. Which of the following recon attacks is the MOST LIKELY to provide this information?
Liam, a network engineer, configures firewalls to prevent outbound file transfers over unauthorized FTP and HTTP channels. Despite this, an insider used encrypted traffic via HTTPS to exfiltrate data. A review revealed that no deep packet inspection was in place. Which insider threat eradication control could have helped prevent this?
Following a security alert, the incident response team at a legal consulting firm suspects that an employee used a USB storage device to exfiltrate confidential client data. To confirm which USB device was connected and gather timestamps and identifiers, which method is most effective?