CompTIA Related Exams
CAS-005 Exam
A company detects suspicious activity associated with inbound connections. Security detection tools are unable to categorize this activity. Which of the following is the best solution to help the company overcome this challenge?
A security engineer discovers that some legacy systems are still in use or were not properly decommissioned. After further investigation, the engineer identifies that an unknown and potentially malicious server is also sending emails on behalf of the company. The security engineer extracts the following data for review:
Which of the following actions should the security engineer take next? (Select two).
A vulnerability scan was performed on a website, and the following encryption suites were found:
Which of the following actions will remediate the vulnerability?